Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

被引:0
|
作者
Hansen, James V. [1 ]
Lowry, Paul Benjamin [1 ]
Meservy, Rayman D. [1 ]
机构
[1] Brigham Young Univ, Marriott Sch, Dept Informat Syst, Provo, UT 84602 USA
来源
关键词
Data mining; intrusion detection; pattern discovery; rule-induction algorithms; link analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In The extensive growth of computing networks and tools and tricks for intruding into and attacking networks has underscored the importance of intrusion detection in network security. Yet, contemporary intrusion detection systems (IDS) are limiting in that they typically employ a misuse detection strategy, with searches for patterns of program or user behavior that match known intrusion scenarios, or signatures. Accordingly, there is a need for more robust and adaptive methods for designing and updating intrusion detection systems. One promising approach is the use of data mining methods for discovering intrusion patterns. Discovered patterns and profiles can be translated into classifiers for detecting deviations from normal usage patterns. Among promising mining methods are association rules, link analysis, and rule-induction algorithms. Our particular contribution is a unique approach to combining association rules with link analysis and a rule-induction algorithm to augment intrusion detection systems.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [1] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [2] A fuzzy data mining algorithm for finding sequential patterns
    Hu, YC
    Chen, RS
    Tzeng, GH
    Shieh, JH
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 2003, 11 (02) : 173 - 193
  • [3] An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
    Leu, Fang-Yie
    Tsai, Kun-Lin
    Hsiao, Yi-Ting
    Yang, Chao-Tung
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 427 - 438
  • [4] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12
  • [5] Finding Banded Patterns in Data: The Banded Pattern Mining Algorithm
    Abdullahi, Fatimah B.
    Coenen, Frans
    Martin, Russell
    BIG DATA ANALYTICS AND KNOWLEDGE DISCOVERY, 2015, 9263 : 95 - 107
  • [6] Towards data mining temporal patterns for anomaly intrusion detection systems
    Sengupta, S
    Andriamanalimanana, B
    Card, SW
    Kadam, P
    Ranwadkar, S
    Das, K
    Parikh, S
    IDAACS'2003: PROCEEDINGS OF THE SECOND IEEE INTERNATIONAL WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2003, : 205 - 209
  • [7] Mining for data (Finding useful data, technology)
    Sipes, James L.
    LANDSCAPE ARCHITECTURE, 2006, 96 (10): : 126 - +
  • [8] Finding Patterns with a Rotten Core: Data Mining for Crime Series with Cores
    Wang, Tong
    Rudin, Cynthia
    Wagner, Daniel
    Sevieri, Rich
    BIG DATA, 2015, 3 (01) : 3 - 21
  • [9] Finding hidden patterns of hospital infections on newborn: A data mining approach
    Aksoy, Inci
    Badur, Bertan
    Mardikyan, Sona
    ISTANBUL UNIVERSITY JOURNAL OF THE SCHOOL OF BUSINESS, 2010, 39 (02): : 210 - 226
  • [10] Mining order preserving patterns in microarray data by finding frequent orders
    Teng, Li
    Chan, Laiwan
    PROCEEDINGS OF THE 7TH IEEE INTERNATIONAL SYMPOSIUM ON BIOINFORMATICS AND BIOENGINEERING, VOLS I AND II, 2007, : 1019 - 1026