Real time data mining-based intrusion detection

被引:0
作者
Lee, W [1 ]
Stolf, SJ [1 ]
Chan, PK [1 ]
Eskin, E [1 ]
Fan, W [1 ]
Miller, M [1 ]
Hershkop, S [1 ]
Zhang, JX [1 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
来源
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS | 2001年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present an overview of our research in real time data mining-based intrusion detection systems (IDSs). We focus on issues related to deploying a data mining-based IDS in a real time environment, We describe our approaches to address three types of issues: accuracy, efficiency, and usability To improve accuracy, data mining programs are used to analyze audit data and extract features that can distinguish normal activities from intrusions; we use artificial anomalies along with normal and/or intrusion data to produce more effective misuse and anomaly detection models. To improve efficiency, the computational costs of features are analyzed and a multiple-model cost-based approach is used to produce detection models with low cost and high accuracy. We also present a distributed architecture for evaluating cost-sensitive models in real-time. To improve usability, adaptive learning algorithms are used to facilitate model construction and incremental updates; unsupervised anomaly detection algorithms are used to reduce the reliance on labeled data. We also present an architecture consisting of sensors, detectors, a data warehouse, and model generation components. This architecture facilitates the sharing and storage of audit data and the distribution of new or updated models. This architecture also improves the efficiency and scalability of the IDS.
引用
收藏
页码:89 / 100
页数:12
相关论文
共 35 条
[1]  
[Anonymous], ACM Trans. Inf. Syst. Secur, DOI DOI 10.1145/322510.322526
[2]  
[Anonymous], THESIS COLUMBIA U
[3]  
[Anonymous], THESIS COLUMBIA U
[4]  
Barnett V., 1984, Outliers in Statistical Data, V2nd
[5]   Distributed data mining in credit card fraud detection [J].
Chan, PK ;
Fan, W ;
Prodromidis, AL ;
Stolfo, SJ .
IEEE INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1999, 14 (06) :67-74
[6]  
Cohen WW, 1995, MACHINE LEARNING
[7]  
Egan J.P., 1975, SERIES COGNITION PER
[8]  
ESKIN E, 2000, P ACMCCS WORKSH INTR
[9]  
Eskin E., 2000, P 17 INT C MACH LEAR
[10]  
FAN W, 2000, P 2000 EUR C MACH LE