Anomaly Detection for PTM's Network Traffic Using Association Rule

被引:0
作者
Eljadi, Entisar E. [1 ]
Othman, Zulaiha Ali [1 ]
机构
[1] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Sch Comp Sci, Bangi 43600, Selangor, Malaysia
来源
2011 3RD CONFERENCE ON DATA MINING AND OPTIMIZATION (DMO) | 2011年
关键词
network intrusion detection system (NIDS); Data Mining; Association Rules Techniques;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to evaluate the quality of UKM's NIDS, this paper presents the process of analyzing network traffic captured by Pusat Teknologi Maklumat (PTM) to detect whether it has any anomalies or not and to produce corresponding anomaly rules to be included in an update of UKM's NIDS. The network traffic data was collected using WireShark for three days, using the six most common network attributes. The experiment used three association rule data mining techniques known as Appriori, Fuzzy Appriori and FP-Growth based on two, five and ten second window slicing. Out of the four data-sets, data-sets one and two were detected to have anomalies. The results show that the Fuzzy Appriori algorithm presented the best quality result, while FP-Growth presented a faster time to reach a solution. The data-sets, which was pre-processed in the form of two second window slicing displayed better results. This research outlines the steps that can be utilized by an organization to capture and detect anomalies using association rule data mining techniques to enhance the quality their of NIDS.
引用
收藏
页码:63 / 69
页数:7
相关论文
共 50 条
  • [41] Implementation of Association Rule Mining using CUDA
    Adil, Syed Hasan
    Qamar, Sadaf
    ICET: 2009 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2009, : 332 - +
  • [42] IMPROVED ASSOCIATION RULE MINING ALGORITHM FOR NETWORK ALARM ANALYSIS
    Zhao, Xinghua
    Li, Jie
    Wang, Yunfeng
    2009 GLOBAL MOBILE CONGRESS, 2009, : 323 - 328
  • [43] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [44] The Research of Network Anomaly Detection Technology Based on Data Mining
    Wu, Chunhong
    Xia, Wenzhong
    Liu, Fengyun
    PROCEEDINGS OF THE 2015 2ND INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER ENGINEERING AND ELECTRONICS (ICECEE 2015), 2015, 24 : 1689 - 1692
  • [45] Data preprocessing for anomaly based network intrusion detection: A review
    Davis, Jonathan J.
    Clark, Andrew J.
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 353 - 375
  • [46] The Key Techniques of the Network Anomaly Detection Based on Data Mining
    He Xiaobo
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
  • [47] Applying fuzzy data mining to network unsupervised anomaly detection
    Xiang, G
    Min, W
    Zhao, RC
    INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2005, VOLS 1 AND 2, PROCEEDINGS, 2005, : 1249 - 1253
  • [48] Content-Aware Anomaly Detection with Network Representation Learning
    Li, Zhong
    Jin, Xiaolong
    Zhuang, Chuanzhi
    Sun, Zhi
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2020, PT III, 2020, 12454 : 50 - 64
  • [49] Anomaly Extraction in Backbone Networks Using Association Rules
    Brauckhoff, Daniela
    Dimitropoulos, Xenofontas
    Wagner, Arno
    Salamatian, Kave
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) : 1788 - 1799
  • [50] Association Rule Mining Based on Bipartite Network: A study of Enterprise Export Market Network
    Liu, Xiao
    Yang, Jianmei
    PROCEEDINGS OF 2009 CONFERENCE ON SYSTEMS SCIENCE, MANAGEMENT SCIENCE & SYSTEM DYNAMICS, VOL 4, 2009, : 171 - 178