Research Article

Application of High-Dimensional Outlier Mining Based on the Maximum Frequent Pattern Factor in Intrusion Detection

Algorithm 1

MFPOF-OM algorithm.
Input: D//network behaviour dataset
 MinSP//minimum support threshold
k//number of outliers threshold
Output: k network behaviour outlier data records
Begin
 // Stpe 1–3: mining the maximum frequent item sets based on PF-Tree Algorithm
 Step 1: To D, the HeaderTable (D) is generated to satisfy the MinSP;//Calculating the header table of PF-tree
 Step 2: To D, the frequent item set tree is generated to satisfy the given MinSP by using the PF-Tree Algorithm, and denoted as: T;//Obtains frequent item set tree according to the PF-Tree algorithm
 Step 3: Obtains maximum frequents item sets based on an improved PF-Tree, and obtains MFPs (D, MinSP) and support (X)//Obtains maximum frequents item sets
 //Stpe 4–7: Mine k outliers data with minimum MFPOF value based on the obtained MFPs
 Step 4: foreach t in D
 According to formula (3), calculates the maximum frequent patterns factor of each record t: MFPOF(t);
 end foreach//Calculating maximum frequent factor of each transaction t
 Step 5: Obtains a MFPOF value of each network behaviour records t;
 Step 6: For all t, they are sorted in ascending order according to MFPOF (t);
 Step 7: Return the first k network behaviour record with the minimum MFPOF value, and they are k outlier data in the network behaviour data.
End