Cyber intrusion detection through association rule mining on multi-source logs

被引:19
作者
Lou, Ping [1 ,2 ]
Lu, Guantong [1 ,2 ]
Jiang, Xuemei [1 ,2 ]
Xiao, Zheng [1 ,2 ]
Hu, Jiwei [1 ,2 ]
Yan, Junwei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Hubei Key Lab Broadband Wireless Commun & Sensor, Wuhan 430070, Hubei, Peoples R China
关键词
Security logs; Association rules; Data mining; Cyber intrusion; PREDICTION; EVENT;
D O I
10.1007/s10489-020-02007-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs, and system logs provide historical information describing potential security risks. However, the use of logs for cyber intrusion detection relies heavily on expert knowledge. It is very difficult for the non-expert to identify these intrusion behaviors. This paper proposes a new method for mining association rules from multi-source logs to detect various intrusion behaviors in the cloud computing platform. In this method, a rule base is constructed to detect cyber intrusion. An adaptive approach is used to speed up the calculation of the association rule mining, in which the decision depends on the time complexity of the algorithm. Various cyber-attacks are simulated in the verification experiments which show the calculation speed of the proposed method is faster than other algorithms. Furthermore, compared with other methods, the performance of the proposed intrusion detection method is better than others in term of precision, recall, and f-measure.
引用
收藏
页码:4043 / 4057
页数:15
相关论文
共 36 条
  • [1] Agrawal R., 1994, 20 INT C VER LARG DA, P487
  • [2] Fuzziness based semi-supervised learning approach for intrusion detection system
    Ashfaq, Rana Aamir Raza
    Wang, Xi-Zhao
    Huang, Joshua Zhexue
    Abbas, Haider
    He, Yu-Lin
    [J]. INFORMATION SCIENCES, 2017, 378 : 484 - 497
  • [3] Execution anomaly detection in large-scale systems through console log analysis
    Bao, Liang
    Li, Qian
    Lu, Peiyao
    Lu, Jie
    Ruan, Tongxiao
    Zhang, Ke
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 143 : 172 - 186
  • [4] An intrusion detection scheme based on the ensemble of discriminant classifiers
    Bhati, Bhoopesh Singh
    Rai, C. S.
    Balamurugan, B.
    Al-Turjman, Fadi
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
  • [5] Brahmi Hanen, 2012, Advances in Knowledge Discovery and Data Mining. Proceedings 16th Pacific-Asia Conference (PAKDD 2012), P13, DOI 10.1007/978-3-642-30220-6_2
  • [6] A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
    Buczak, Anna L.
    Guven, Erhan
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02): : 1153 - 1176
  • [7] Adversarial environment reinforcement learning algorithm for intrusion detection
    Caminero, Guillermo
    Lopez-Martin, Manuel
    Carro, Belen
    [J]. COMPUTER NETWORKS, 2019, 159 : 96 - 109
  • [8] A new hybrid approach for intrusion detection using machine learning methods
    Cavusoglu, Unal
    [J]. APPLIED INTELLIGENCE, 2019, 49 (07) : 2735 - 2761
  • [9] A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks
    Chen, Lin
    Leneutre, Jean
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) : 165 - 178
  • [10] Dean J, 2004, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION (OSDE '04), P137