An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network | Wireless Personal Communications Skip to main content
Log in

An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper presents an anomaly detection model based on normalized mutual information feature selection (NMIFS) and quantum wavelet neural network (QWNN). The goal of the proposed model is to address the problem of determining the feature subset used to detect an anomaly in a machine learning task. In order to achieve an effective reduction for high-dimensional feature data, the NMIFS method is used to select the best feature combination from a given set of sample features. Then, the best combination of feature vectors are sent to the QWNN classifier for learning and training in the training phase, and the anomaly detection model is obtained. At the detection stage, the data is fed into the detection model and ultimately generates accurate detection results. The learning algorithm of structural risk minimization extreme learning machine is employed by the QWNN classifier to account for empirical and confidence risk. The experimental results on real abnormal data demonstrate that the NMIFS–QWNN method has higher detection accuracy and a lower false negative rate than the existing common anomaly detection methods. Furthermore, the complexity of the algorithm is low and the detection accuracy can reach up to 95.8%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Marnerides, A. K., Schaeffer-Filho, A., & Mauthe, A. (2014). Traffic anomaly diagnosis in Internet backbone networks: A survey. Computer Networks, 73, 224–243.

    Article  Google Scholar 

  2. Sheikhan, M., & Jadidi, Z. (2014). Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network. Neural Computing and Applications, 24(3–4), 599–611.

    Article  Google Scholar 

  3. Lin, S. W., Ying, K. C., Lee, C. Y., & Lee, Z. J. (2012). An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection. Applied Soft Computing, 12(10), 3285–3290.

    Article  Google Scholar 

  4. Amiri, F., Yousefi, M. M. R., Lucas, C., Shakery, A., & Yazdani, N. (2011). Mutual information-based feature selection for intrusion detection systems. Journal of Network and Computer Applications, 34, 1184–1199.

    Article  Google Scholar 

  5. Peng, L., Zhang, H., Yang, B., & Chen, Y. (2014). Feature evaluation for early stage internet traffic identification. Algorithms and architectures for parallel processing (pp. 511–525). Berlin: Springer.

    Google Scholar 

  6. Yu, L., & Liu, H. (2004). Efficient feature selection via analysis of relevance and redundancy. Journal of Machine Learning Research: JMLR, 5, 1205–1224.

    MathSciNet  MATH  Google Scholar 

  7. Lashkia, G., & Anthony, L. (2004). Relevant, irredundant feature selection and noisy example elimination. IEEE Transactions on Systems, Man, and Cybernetics, 34(2), 888–897.

    Article  Google Scholar 

  8. Battiti, R. (1994). Using mutual information for selecting features in supervised neural net learning. IEEE Transactions on Neural Networks, 5(4), 537–550.

    Article  Google Scholar 

  9. Kwak, N., & Choi, C. (2002). Input feature selection for classification problems. IEEE Transactions on Neural Networks, 13(1), 143–159.

    Article  Google Scholar 

  10. Peng, H., Long, F., & Ding, C. (2005). Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence, 27(8), 1226–1238.

    Article  Google Scholar 

  11. Estévez, P. A., Tesmer, M., Perez, C. A., & Zurada, J. M. (2009). Normalized mutual information feature selection. IEEE Transactions on Neural Networks, 20(2), 189–201.

    Article  Google Scholar 

  12. Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2014). MIFS-ND: A mutual information-based feature selection method. Expert Systems with Applications, 41(14), 6371–6385.

    Article  Google Scholar 

  13. Li, J. (2015). Quantum-inspired neural networks with application. Open Journal of Applied Sciences, 5(06), 233.

    Article  Google Scholar 

  14. Cover, T. M., & Thomas, J. A. (2012). Elements of information theory. New York: Wiley.

    MATH  Google Scholar 

  15. Haroutunian, E. (2011). Information theory and statistics. International Encyclopedia of statistical science (pp. 666–667). Berlin: Springer.

    Book  Google Scholar 

  16. Shi, Y., & Mizumoto, M. (2000). Some considerations on conventional neuro-fuzzy learning algorithms by gradient descent method. Fuzzy Sets and Systems, 112(1), 51–63.

    Article  MathSciNet  Google Scholar 

  17. Huang, G. B., Wang, D. H., & Lan, Y. (2011). Extreme learning machines: A survey. International Journal of Machine Learning and Cybernetics, 2(2), 107–122.

    Article  Google Scholar 

  18. Miche, Y., Sorjamaa, A., Bas, P., Jutten, C., & Lendasse, A. (2010). OP-ELM: Optimally pruned extreme learning machine. IEEE Transactions on Neural Networks, 21(1), 158–162.

    Article  Google Scholar 

  19. He, Y. L., Geng, Z. Q., Xu, Y., & Zhu, Q. X. (2014). A hierarchical structure of extreme learning machine (HELM) for high-dimensional datasets with noise. Neurocomputing, 128, 407–414.

    Article  Google Scholar 

  20. Zhu, Z. F., Wang, P. P., Jia, Z. P., Xiao, H. R., Zhang, G. Y., & Liang, H. (2014). A modified minimum risk bayes and it’s application in spam filtering. Frontier and future development of information technology in medicine and education (pp. 2155–2159). Berlin: Springer.

    Google Scholar 

  21. Shao, Y. H., Chen, W. J., Wang, Z., Li, C. N., & Deng, N. Y. (2015). Weighted linear loss twin support vector machine for large-scale classification. Knowledge-Based Systems, 73, 276–288.

    Article  Google Scholar 

  22. Stolfo, B. S. (2010). KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html

  23. Faqhruldin, O. N., El-Saadany, E. F., & Zeineldin, H. H. (2014). A universal islanding detection technique for distributed generation using pattern recognition. IEEE Transactions on Smart Grid, 5(4), 1985–1992.

    Article  Google Scholar 

  24. Yu, S., Tranchevent, L. C., Liu, X., & Glanzel, W. (2012). Optimized data fusion for kernel k-means clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence, 34(5), 1031–1039.

    Article  Google Scholar 

  25. Cheng, D., Zhang, S., Deng, Z., Zhu, Y., & Zong, M. (2014). kNN algorithm with data-driven k value. Advanced data mining and applications (pp. 499–512). Berlin: Springer.

    Google Scholar 

  26. Guo, Y., Li, K., & Liu, X. (2013). Fault diagnosis for power system transmission line based on PCA and SVMs. intelligent computing for sustainable energy and environment (pp. 524–532). Berlin: Springer.

    Book  Google Scholar 

  27. Sharma, S. K., Pandey, P., Tiwari, S. K., & Sisodia, M. S. (2012). An improved network intrusion detection technique based on K-means clustering via Naϊve bayes classification. In International conference on advances in engineering, science and management, pp. 417–422

Download references

Acknowledgements

This research received grant from National Natural Science Foundation of China (Nos. 61672471, 61502436). We also supported by 2016 annual Henan technological innovation (No. 164100510019).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wanwei Huang.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, W., Zhang, J., Sun, H. et al. An Anomaly Detection Method Based on Normalized Mutual Information Feature Selection and Quantum Wavelet Neural Network. Wireless Pers Commun 96, 2693–2713 (2017). https://doi.org/10.1007/s11277-017-4320-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4320-2

Keywords