Cooperative malicious network behavior recognition algorithm in E-commerce

Abstract Because of the virtuality of the e-commerce transaction, its transaction behavior faces the serious security threats. However, the existing recognition algorithms of malicious transaction behaviors only rely on traditional malicious features, resulting in low recognition efficiency. This paper proposes a novel technique for identifying collaborative malicious network behavior in e-commerce: the quantum behavior-based particle swarm optimization method with global search capability, which is combined with the rapidly converging k-means method to improve efficiency and effectiveness of the algorithm. The paper first illustrates that the current malicious network behavior is diversified and collaborative, it is necessary to identify malicious network behavior from a higher level-cooperation level, and then proposes original cooperative malicious behavior features of e-commerce. Second, the use of information transfer entropy (ITE) based on quantum potential energy is introduced to designate the node with the largest ITE in the cluster as the cluster center, avoiding randomly initializing cluster center nodes and calculating the distance repeatedly. Third, the existence of collaborative malicious network behavior and the feasibility of the algorithm are proved using the fixed point theorem in the probability metric space. Meanwhile, quantum behavior-based particle swarm optimization is used to extract cluster centers as a means of improving the spatial distribution and collaborative state of particle nodes, and enables the clustering algorithm to have global search ability. The simulation results demonstrate that the our schemes improve the efficiency and accuracy of identifying cooperative malicious network behavior in e-commerce recognition.

[1]  Lefei Li,et al.  A Smart B2C e-Commerce System Based on ACP Approach , 2014, IEEE Intelligent Systems.

[2]  Gillian Dobbie,et al.  Analysis of particle swarm optimization based hierarchical data clustering approaches , 2015, Swarm Evol. Comput..

[3]  Ben Niu,et al.  A Population-Based Clustering Technique Using Particle Swarm Optimization and K-Means , 2015, ICSI.

[4]  Clara Pizzuti,et al.  A Multiobjective Genetic Algorithm to Find Communities in Complex Networks , 2012, IEEE Transactions on Evolutionary Computation.

[5]  Haibo He,et al.  Operating Parameters Optimization for the Aluminum Electrolysis Process Using an Improved Quantum-Behaved Particle Swarm Algorithm , 2018, IEEE Transactions on Industrial Informatics.

[6]  Xiaojun Wu,et al.  Convergence analysis and improvements of quantum-behaved particle swarm optimization , 2012, Inf. Sci..

[7]  Ahmed Ali Abdalla Esmin,et al.  Consensus Clustering Based on Particle Swarm Optimization Algorithm , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[8]  Bo Du,et al.  An Improved Quantum-Behaved Particle Swarm Optimization for Endmember Extraction , 2019, IEEE Transactions on Geoscience and Remote Sensing.

[9]  MengChu Zhou,et al.  Modeling and Validating E-Commerce Business Process Based on Petri Nets , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[10]  M E J Newman,et al.  Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[11]  Wanlei Zhou,et al.  Modeling malicious activities in cyber space , 2015, IEEE Network.

[12]  Maoguo Gong,et al.  Quantum-behaved discrete multi-objective particle swarm optimization for complex network clustering , 2017, Pattern Recognit..

[13]  Yidong Li,et al.  BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors , 2020, Inf. Sci..

[14]  Bo Du,et al.  A Novel Endmember Extraction Method for Hyperspectral Imagery Based on Quantum-Behaved Particle Swarm Optimization , 2017, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.

[15]  MengChu Zhou,et al.  Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns , 2016, IEEE Transactions on Automation Science and Engineering.

[16]  K. Menger Statistical Metrics. , 1942, Proceedings of the National Academy of Sciences of the United States of America.

[17]  Nadjet Kamel,et al.  A new quantum chaotic cuckoo search algorithm for data clustering , 2018, Expert Syst. Appl..

[18]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[19]  E. Cunha,et al.  Finding our way: a review on the evolution of human spatial cognition , 2014 .

[20]  Xiaojun Wu,et al.  Quantum-Behaved Particle Swarm Optimization: Analysis of Individual Particle Behavior and Parameter Selection , 2012, Evolutionary Computation.

[21]  Nenghai Yu,et al.  Learning Bregman Distance Functions for Semi-Supervised Clustering , 2012, IEEE Transactions on Knowledge and Data Engineering.

[22]  Jun Sun,et al.  Improved quantum-behaved particle swarm optimization with local search strategy , 2017 .

[23]  Wang Hu,et al.  Adaptive Multiobjective Particle Swarm Optimization Based on Parallel Cell Coordinate System , 2015, IEEE Transactions on Evolutionary Computation.

[24]  Song Guo,et al.  Malware Propagation in Large-Scale Networks , 2015, IEEE Transactions on Knowledge and Data Engineering.

[25]  Naixue Xiong,et al.  An Effective Exponential-Based Trust and Reputation Evaluation System in Wireless Sensor Networks , 2019, IEEE Access.

[26]  Wei Xing Zheng,et al.  Distributed $k$ -Means Algorithm and Fuzzy $c$ -Means Algorithm for Sensor Networks Based on Multiagent Consensus Theory , 2017, IEEE Transactions on Cybernetics.

[27]  Kangfeng Zheng,et al.  Intrusion detection algorithm based on density, cluster centers, and nearest neighbors , 2016, China Communications.

[28]  Leandro Nunes de Castro,et al.  Particle Swarm Clustering in clustering ensembles: Exploiting pruning and alignment free consensus , 2017, Appl. Soft Comput..

[29]  Hojat Ghimatgar,et al.  An improved feature selection algorithm based on graph clustering and ant colony optimization , 2018, Knowl. Based Syst..

[30]  A. Kannan,et al.  Detecting cloning attack in Social Networks using classification and clustering techniques , 2014, 2014 International Conference on Recent Trends in Information Technology.

[31]  Muhammad Al-Qurishi,et al.  Leveraging Analysis of User Behavior to Identify Malicious Activities in Large-Scale Social Networks , 2018, IEEE Transactions on Industrial Informatics.

[32]  Xiao Wang,et al.  VoteTrust: Leveraging friend invitation graph to defend against social network Sybils , 2013, 2013 Proceedings IEEE INFOCOM.

[33]  Kun Guo,et al.  Data mining for the online retail industry: A case study of RFM model-based customer segmentation using data mining , 2012 .

[34]  Yongli Wang,et al.  A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing , 2020, J. Netw. Comput. Appl..

[35]  Shuping Sun,et al.  On the Mahalanobis Distance Classification Criterion for a Ventricular Septal Defect Diagnosis System , 2019, IEEE Sensors Journal.

[36]  Zhu Han,et al.  Mitigating malicious attacks using Bayesian nonparametric clustering in collaborative cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.

[37]  Hsiao-Dong Chiang,et al.  Hierarchical K-means Method for Clustering Large-Scale Advanced Metering Infrastructure Data , 2017, IEEE Transactions on Power Delivery.

[38]  Maoguo Gong,et al.  Greedy discrete particle swarm optimization for large-scale social network clustering , 2015, Inf. Sci..