A NOVEL SIGNATURE SEARCHING FOR INTRUSION DETECTION SYSTEM USING DATA MINING

被引:2
作者
Ding, Ya-Li [1 ]
Li, Lei [1 ]
Luo, Hong-Qi [1 ]
机构
[1] Nanjing Univ Post & Telecommun, Coll Automat, Nanjing 210003, Peoples R China
来源
PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6 | 2009年
关键词
Intrusion detection; Data mining; Association rule; Apriori algorithm; Frequent itemset; Scenario;
D O I
10.1109/ICMLC.2009.5212577
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Intrusion Detection System (IDS) has recently emerged as an important component for enhancing information system security. Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns from the network traffic data. In this paper, we propose a novel signature searching to detect intrusion based on data mining, which is an improved Apriori algorithm. We evaluate the capability of this new approach with the data from KDD 1999 data mining competition. Our experimental results demonstrate the potential of the proposed method.
引用
收藏
页码:122 / 126
页数:5
相关论文
共 9 条
[1]  
ALMAMORY SO, 2008 INT JOINT C NEU, P3564
[2]   Intrusion scenarios detection based on data mining [J].
Ding, Yu-Xin ;
Wang, Hai-Sen ;
Liu, Qing-Wei .
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, :1293-1297
[3]  
Han J., Data Mining: Concepts and Techniques
[4]   A novel network Intrusion Detection System(NIDS) based on signatures search of data mining [J].
Hu Zhengbing ;
Li Zhitang ;
Wu Junqi .
FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, :10-+
[5]   Two formal analyses of attack graphs [J].
Jha, S ;
Sheyner, O ;
Wing, J .
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, :49-63
[6]  
*KDD, 1999, 3 INT KNOWL DISC DAT
[7]   A data mining framework for building intrusion detection models [J].
Lee, W ;
Stolfo, SJ ;
Mok, KW .
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, :120-132
[8]  
Liu Kai-yu, 2007, Journal of Natural Science of Hunan Normal University, V30, P6
[9]  
WANG Q, 2005, SPIE C DAT MIN INTR