Frequent episode rules for Internet anomaly detection

被引:0
作者
Qin, M [1 ]
Hwang, K [1 ]
机构
[1] Univ So Calif, Los Angeles, CA 90089 USA
来源
THIRD IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, PROCEEDINGS | 2004年
关键词
network security; intrusion detection; traffic datamining; anomaly detection; false alarms; grid computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces a new Internet trace technique for generating frequent episode rules to characterize Internet traffic events. These episode rules are used to distinguish anomalous sequences of TCP, UDP, or ICMP connections from normal traffic episodes. Fundamental pruning techniques are introduced to reduce the rule search space by 70%. The new detection scheme was tested over real-life Internet trace data at USC. Our anomaly detection scheme results in a success rate of 47% for DoS, R2L, and port-scanning attacks. These results demonstrate an average of 51% improvement over the use of association rules. We experienced 20 or less false alarms over 200 network attacks in 9 days of tracing experiments. This anomaly detection scheme can be used jointly with signature-based IDS to achieve even higher detection efficiency.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [1] INTERNET ANOMALY DETECTION WITH WEIGHTED FUZZY MATCHING OVER FREQUENT EPISODE RULES
    Chen, Da-Peng
    Zhang, Xiao-Song
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 299 - 302
  • [2] Anomaly detection model of fuzzy episode patterns
    Peng, XG
    Zhang, X
    ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 1451 - 1454
  • [3] Anomaly detection based on fuzzy rules
    Jiao W.
    Li Q.
    International Journal of Performability Engineering, 2018, 14 (02) : 376 - 385
  • [4] Anomaly Detection for Internet of Things Cyberattacks
    Alanazi, Manal
    Aljuhani, Ahamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 261 - 279
  • [5] Anomaly Detection and Mitigation at Internet Scale: A Survey
    Steinberger, Jessica
    Schehlmann, Lisa
    Abt, Sebastian
    Baier, Harald
    EMERGING MANAGEMENT MECHANISMS FOR THE FUTURE INTERNET (AIMS 2013), 2013, 7943 : 49 - 60
  • [6] Practical Anomaly Detection based on Classifying Frequent Traffic Patterns
    Paredes-Oliva, Ignasi
    Castell-Uroz, Ismael
    Barlet-Ros, Pere
    Dimitropoulos, Xenofontas
    Sole-Pareta, Josep
    2012 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2012, : 49 - 54
  • [7] Anomaly detection for internet surveillance
    Bouma, Henri
    Raaijmakers, Stephan
    Halma, Arvid
    Wedemeijer, Harry
    CYBER SENSING 2012, 2012, 8408
  • [8] Anomaly detection for Internet worms
    Al-Hammadi, Y
    Leckie, C
    Integrated Network Management IX: MANAGING NEW NETWORKED WORLDS, 2005, : 133 - 146
  • [9] Emergent Deep Learning for Anomaly Detection in Internet of Everything
    Djenouri, Youcef
    Djenouri, Djamel
    Belhadi, Asma
    Srivastava, Gautam
    Lin, Jerry Chun-Wei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (04) : 3206 - 3214
  • [10] Network Anomaly Detection Approach Based on Frequent Pattern Mining Technique
    Dominic, Dhanapal Durai
    Said, Aiman Moyaid
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST), 2014,