Cyber intrusion detection through association rule mining on multi-source logs

被引:21
作者
Lou, Ping [1 ,2 ]
Lu, Guantong [1 ,2 ]
Jiang, Xuemei [1 ,2 ]
Xiao, Zheng [1 ,2 ]
Hu, Jiwei [1 ,2 ]
Yan, Junwei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Hubei Key Lab Broadband Wireless Commun & Sensor, Wuhan 430070, Hubei, Peoples R China
关键词
Security logs; Association rules; Data mining; Cyber intrusion; PREDICTION; EVENT;
D O I
10.1007/s10489-020-02007-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs, and system logs provide historical information describing potential security risks. However, the use of logs for cyber intrusion detection relies heavily on expert knowledge. It is very difficult for the non-expert to identify these intrusion behaviors. This paper proposes a new method for mining association rules from multi-source logs to detect various intrusion behaviors in the cloud computing platform. In this method, a rule base is constructed to detect cyber intrusion. An adaptive approach is used to speed up the calculation of the association rule mining, in which the decision depends on the time complexity of the algorithm. Various cyber-attacks are simulated in the verification experiments which show the calculation speed of the proposed method is faster than other algorithms. Furthermore, compared with other methods, the performance of the proposed intrusion detection method is better than others in term of precision, recall, and f-measure.
引用
收藏
页码:4043 / 4057
页数:15
相关论文
共 36 条
[1]  
Agrawal R., 1994, 20 INT C VERY LARGE, P487
[2]  
[Anonymous], 2017, Southeast Asian Journal of Sciences
[3]   Fuzziness based semi-supervised learning approach for intrusion detection system [J].
Ashfaq, Rana Aamir Raza ;
Wang, Xi-Zhao ;
Huang, Joshua Zhexue ;
Abbas, Haider ;
He, Yu-Lin .
INFORMATION SCIENCES, 2017, 378 :484-497
[4]   Execution anomaly detection in large-scale systems through console log analysis [J].
Bao, Liang ;
Li, Qian ;
Lu, Peiyao ;
Lu, Jie ;
Ruan, Tongxiao ;
Zhang, Ke .
JOURNAL OF SYSTEMS AND SOFTWARE, 2018, 143 :172-186
[5]   An intrusion detection scheme based on the ensemble of discriminant classifiers [J].
Bhati, Bhoopesh Singh ;
Rai, C. S. ;
Balamurugan, B. ;
Al-Turjman, Fadi .
COMPUTERS & ELECTRICAL ENGINEERING, 2020, 86
[6]  
Brahmi Hanen, 2012, Advances in Knowledge Discovery and Data Mining. Proceedings 16th Pacific-Asia Conference (PAKDD 2012), P13, DOI 10.1007/978-3-642-30220-6_2
[7]   A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection [J].
Buczak, Anna L. ;
Guven, Erhan .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (02) :1153-1176
[8]   Adversarial environment reinforcement learning algorithm for intrusion detection [J].
Caminero, Guillermo ;
Lopez-Martin, Manuel ;
Carro, Belen .
COMPUTER NETWORKS, 2019, 159 :96-109
[9]   A new hybrid approach for intrusion detection using machine learning methods [J].
Cavusoglu, Unal .
APPLIED INTELLIGENCE, 2019, 49 (07) :2735-2761
[10]   A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks [J].
Chen, Lin ;
Leneutre, Jean .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (02) :165-178