Intrusion Detection Models Based on Data Mining

被引:4
作者
Mao, Guojun [1 ]
Wu, Xindong [2 ]
Jiang, Xuxian [3 ]
机构
[1] Cent Univ Finance & Econ, Sch Informat, Beijing 100086, Peoples R China
[2] Univ Vermont, Dept Comp Sci, Burlington, VT 05405 USA
[3] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
基金
美国国家科学基金会;
关键词
Intrusion detection; data mining; frequency pattern; tree pattern; ANOMALY DETECTION; SYSTEM;
D O I
10.1080/18756891.2012.670519
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental technique to detect potential intrusions. This paper proposes two models based on data mining technology, respectively called frequency patterns (FP) and tree patterns (TP) for intrusion detection. FP employs a typical method of sequential mining based on frequency analysis, and uses a short sequence model to find out quickly frequent sequential patterns in the training system-call sequences. TP makes use of the technique of tree pattern mining, and can get a quality profile from the training system-call sequences of a given system. Experimental results show that FP has good performances in training and detecting intrusions from short system-call sequences, and TP can achieve a high detection precision in handling long sequences.
引用
收藏
页码:30 / 38
页数:9
相关论文
共 17 条
[1]  
BRUGGER ST, 2004, THESIS U CALIFORNIA
[2]  
Chandola V., 2010, P ACM 6 ANN WORKSH C
[3]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[4]  
Haines J. W., 2000, P INT S REC ADV INTR, P162
[5]   A statistically based system for prioritizing information exploration under uncertainty [J].
Helman, P ;
Bhangoo, J .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 1997, 27 (04) :449-466
[6]  
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[7]  
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[8]   Information-theoretic measures for anomaly detection [J].
Lee, W ;
Xiang, D .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :130-143
[9]  
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[10]  
LEE W, 1997, P AAAI97 WORKSH AI M, P50