Novel intrusion prediction mechanism based on honeypot log similarity

被引:20
作者
Jiang, Ci-Bin [1 ]
Liu, I-Hsien [1 ]
Chung, Yao-Nien [1 ]
Li, Jung-Shian [1 ]
机构
[1] Natl Cheng Kung Univ, Inst Comp & Commun Engn, Dept Elect Engn, Tainan 701, Taiwan
关键词
FRAMEWORK; DISCOVERY; PATTERNS; SYSTEM;
D O I
10.1002/nem.1923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current network-based intrusion detection systems have a very high rate of false alarms, and this phenomena results in significant efforts to gauge the threat level of the anomalous traffic. In this paper, we propose an intrusion detection mechanism based on honeypot log similarity analysis and data mining techniques to predict and block suspicious flows before attacks occur. With honeypot logs and association rule mining, our approach can reduce the false alarm problem of intrusion detection because only suspicious traffic would be present in the honeypots. The proposed mechanism can reduce human effort, and the entire system can operate automatically. The results of our experiments indicate that the honeypot prediction system is practical for protecting assets from attacks or misuse. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:156 / 175
页数:20
相关论文
共 47 条
  • [11] Cheswick B., 1992, P WINT USENIX C, P163
  • [12] Similarity as a central approach to flow-based anomaly detection
    Drasar, Martin
    Vizvary, Martin
    Vykopal, Jan
    [J]. INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2014, 24 (04) : 318 - 336
  • [13] Dressler Falko., 2007, Communication in Distributed Systems (KiVS), 2007 ITG-GI Conference, P1
  • [14] Ester M., 1996, KDD-96 Proceedings. Second International Conference on Knowledge Discovery and Data Mining, P226
  • [15] Ghosh AK, 1999, USENIX ASSOCIATION PROCEEDINGS OF THE EIGHTH USENIX SECURITY SYMPOSIUM (SECURITY '99), P141
  • [16] Ghourabi A., 2010, Computer Systems and Applications (AICCSA), 2010 IEEE/ACS International Conference on, P1
  • [17] Han JW, 2000, SIGMOD RECORD, V29, P1
  • [18] A taxonomy of networks and computer attacks
    Hansman, S
    Hunt, R
    [J]. COMPUTERS & SECURITY, 2005, 24 (01) : 31 - 43
  • [19] A statistically based system for prioritizing information exploration under uncertainty
    Helman, P
    Bhangoo, J
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 1997, 27 (04): : 449 - 466
  • [20] Automated discovery of concise predictive rules for intrusion detection
    Helmer, G
    Wong, JSK
    Honavar, V
    Miller, L
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2002, 60 (03) : 165 - 175