Ye DU, dan ZHANGYa, hong LIMei, et al. Improved FastICA algorithm for data optimization processing in intrusion detection[J]. Journal on Communications, 2016, 37(1): 42-48.
DOI:
Ye DU, dan ZHANGYa, hong LIMei, et al. Improved FastICA algorithm for data optimization processing in intrusion detection[J]. Journal on Communications, 2016, 37(1): 42-48. DOI: 10.11959/j.issn.1000-436x.2016006.
Improved FastICA algorithm for data optimization processing in intrusion detection
For the purpose of achieving the better data optimizat sing results in intrusion detection
an improved FastICA algorithm was proposed. The weighted correlation coefficient was adopted in the phase of albinism processing to reduce information loss
and the Newton's iterative method was improved for third-order convergence. The algorithm was introduced concretely
meanwhile the time complexity was analyzed in detail. The experiment shows that the method has the advantages of less times of iteration and fast speed of convergence
which can effectively decrease the losses of data and increase the efficiency of data optimization in in ion detection.
National Internet Emergency Center . The overview of Ch na's Internet network security situation in 2013 [J/OL ] . http://www.cert.org.cn http://www.cert.org.cn .
ANDERSO J P . Computer Security Threat Monitoring and Surveil-lance [P ] . USA:PA 19034 , 1980 . 4
LI M . An approach to reliably identifying signs of DDOS flood attacks based on LRD traffic pattern recognition [J ] . Computers & Security , 2004 , 23 ( 7 ): 549 - 558 .
WANG H Q , DU Y , PANG Y G . Research in intrusion detection tech-nology [J ] . Application Research of Computers , 2003 , 10 ( 20 ): 90 - 94 .
DEREK S , GUAN Q , FU S . An anomaly detection framework for autonomic management of compute cloud systems [C ] // Computer Software and Applications Conference Workshops (COMPSACW).Seoul , c 2010 : 376 - 381 .
GUAN Q , ZHANG Z M , FU S . Ensemble of Bayesian predictors and decision trees for proactive failure management in clo computing systems [J ] . Journal of Communications , 2012 , 7 ( 1 ): 52 - 61 .
XIA M N , GONG D L , XIAO J . An adaptive fault detection method for reliable cloud computing [J ] . Application Research of Compu-ting , 2013 , 31 ( 2 ): 426 - 430 .
HUSANBIR S , LIU J G , GUAN Q . AFD:adaptive failure detection system for cloud computing infrastructures [C ] // Performance Computing and Communications Conference (IPCCC). Austin,TX , c 2012 : 71 - 80 .
ZHU Q , TERESA T , XIE Q . Automatic fault diagnosis in cloud infra-structure [C ] // Cloud Computing Technology and Science (CloudCom). Bristol , c 2013 : 467 - 474 .
GUAN Q , FU S . Adaptive anomaly identification by exploring metric subspace in cloud computing infrastructures [C ] // Reliable Distributed Systems (SRDS). Braga , c 2013 : 205 - 214 .
LI N , ZHAO H J , JIA G R . Hyperspectral data dimensiona ity reduc-tion method based factor analysis model [J ] . Journal Image and Graph-ics , 2011 , 16 ( 11 ): 2030 - 2035 .
LAN R W , SUN H J . The style analysis and synthesis of uman mo-tion based on inverse kinematics and reconstruction type of ICA [J ] . Acta Automatica Sinica , 2014 , 40 ( 6 ): 1135 - 1147 .
RONG H , WANG H M , XIAN M . A method of RoQ attack detection based on FastICA [J ] . Journal of Electronics & Information Technolo-gy , 2013 , 35 ( 10 ): 2307 - 2313 .
吴逊 . 基于独立成分分析的特征提取方法研究 [D ] . 厦门 : 厦门大学 , 2007 .
WU X . The Research on Features Extraction Method Based on In-dependent Component Analysis [D ] . Xiamen : Xiamen University , 2007 .
YU M M , ZHANG Y . The efficiency index of Newton iterative me-thod and serveral improve formats [J ] . Journal of Mathe tics in Prac-tice and Theory , 2008 , 38 ( 18 ): 154 - 159 .
FAN X L , FENG H H , YUAN M . Principal components analysis based on mutual information for feature selection algorithm [J ] . Con-trol and Decision , 2013 , 28 ( 6 ): 915 - 919 .