Skip to main content

Improved OBS-NMF Algorithm for Intrusion Detection

  • Conference paper
  • First Online:
  • 1115 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 791))

Abstract

In this paper, the optimal brain surgeon (OBS) strategy is introduced to improve the iterative rule of non-negative matrix factorization (NMF) algorithm for intrusion detection, which is called OBS-NMF algorithm. A new convergence condition and criterion function are proposed to improve the performance of the OBS-NMF algorithm. Then the proposed method is applied in the HIDS and NIDS, the experimental results show that our method can obtain higher accuracy and better stability than the NMF algorithm, and achieves satisfying detection performance. The improved OBS-NMF algorithm is also suitable for real-time intrusion detection.

The corresponding author is Yue Wu (ywu@xidian.edu.cn).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alaeiyan, M.H., Parsa, S.: Automatic loop detection in the sequence of system calls. In: International Conference on Knowledge-Based Engineering and Innovation, pp. 720–723. IEEE (2015)

    Google Scholar 

  2. Canfora, G., Medvet, E., Mercaldo, F., Visaggio, C.A.: Detecting android malware using sequences of system calls. In: International Workshop on Software Development Lifecycle for Mobile, pp. 13–20. ACM (2015)

    Google Scholar 

  3. Cardona-Morrell, M., Chapman, A., Turner, R.M., Lewis, E., Gallego-Luxan, B., Parr, M., Hillman, K.: Pre-existing risk factors for in-hospital death among older patients could be used to initiate end-of-life discussions rather than rapid response system calls: a case-control study. Resuscitation, 76–80 (2016)

    Google Scholar 

  4. Ashfaq, R.A.R., Wang, X.Z., Huang, J.Z., Abbas, H., He, Y.L.: Fuzziness based semi-supervised learning approach for intrusion detection system. Inform. Sci. 378, 484–497 (2017)

    Article  Google Scholar 

  5. Hernando, A., Bobadilla, J., Ortega, F.: A non negative matrix factorization for collaborative filtering recommender systems based on a bayesian probabilistic model. Knowl-Based. Syst. 97, 188–202 (2016)

    Article  Google Scholar 

  6. Zafeiriou, S., Petrou, M.: Nonlinear non-negative component analysis algorithms. IEEE Trans. Image Process. 19(4), 1050–1066 (2010)

    Article  MATH  MathSciNet  Google Scholar 

  7. Oza, N., Castle, J.P., Stutz, J.: Classification of aeronautics system health and safety documents. IEEE Trans. Power Syst. Man Cybern. Part C (Appl. Rev.) 39(6), 670–680 (2009)

    Article  Google Scholar 

  8. Grindlay, G., Ellis, D.: Multi-Voice polyphonic music transcription using eigen instruments. In: IEEE Workshop on Applications of Signal Processing to Audio and Acoustics, vol. 18(21), pp. 53–56 (2009)

    Google Scholar 

  9. Hassibi, B., Stork, D.G., Wolff, G.J.: Optimal Brain Surgeon and general network pruning. In: IEEE International Conference on Neural Networks, pp. 293–299 (1993)

    Google Scholar 

  10. Forrest, S., Hofmeyr, S. A., Somayaji, A., Longstaff, T, A.: A sense of self for unix processes. In: IEEE Symposium on Security and Privacy, pp. 120–128 (1996)

    Google Scholar 

  11. Tran, D., Tan, Y.K.: Sensorless illumination control of a networked led-lighting system using feedforward neural network. IEEE Trans. Ind. Electron. 61(4), 2113–2121 (2014)

    Article  Google Scholar 

  12. Attik, M., Bougrain, L., Alexandre, F.: Optimal brain surgeon variants for feature selection. In: IEEE International Joint Conference on Neural Networks, pp. 1371–1374. IEEE (2004)

    Google Scholar 

  13. Lee, D.D., Seung, H.S.: Algorithms for Nonegative Matrix Factorization. Adv. Neural Inf. Process. Syst. 13, 556–562 (2001)

    Google Scholar 

  14. Wang, W., Guan, X.H., Zhang, X.L.: Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization. In: IEEE Conference on Decision and Control, pp. 99–104 (2004)

    Google Scholar 

  15. Computer Immune Systems. http://www.cs.unm.edu/immsec/begin.html

  16. Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. IEICE Trans. Fund. Electron. 31(1), 58–72 (2008)

    Google Scholar 

  17. KDDCUP 99 Data. http://www.kdd.ics.uci.edu.databases/kdd-cup99/kddcup99.html

Download references

Acknowledgment

This work was supported in part by the National Basic Research Program (973 Program) of China (No. 2013CB329402), the National Natural Science Foundation of China (No. 61573015 and 61702392) and the Fundamental Research Funds for the Central Universities under Grant JBX170311.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yue Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ma, W., Wu, Y., Wang, S., Gong, M. (2017). Improved OBS-NMF Algorithm for Intrusion Detection. In: He, C., Mo, H., Pan, L., Zhao, Y. (eds) Bio-inspired Computing: Theories and Applications. BIC-TA 2017. Communications in Computer and Information Science, vol 791. Springer, Singapore. https://doi.org/10.1007/978-981-10-7179-9_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7179-9_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7178-2

  • Online ISBN: 978-981-10-7179-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics