Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

被引:0
|
作者
Hansen, James V. [1 ]
Lowry, Paul Benjamin [1 ]
Meservy, Rayman D. [1 ]
机构
[1] Brigham Young Univ, Marriott Sch, Dept Informat Syst, Provo, UT 84602 USA
来源
关键词
Data mining; intrusion detection; pattern discovery; rule-induction algorithms; link analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In The extensive growth of computing networks and tools and tricks for intruding into and attacking networks has underscored the importance of intrusion detection in network security. Yet, contemporary intrusion detection systems (IDS) are limiting in that they typically employ a misuse detection strategy, with searches for patterns of program or user behavior that match known intrusion scenarios, or signatures. Accordingly, there is a need for more robust and adaptive methods for designing and updating intrusion detection systems. One promising approach is the use of data mining methods for discovering intrusion patterns. Discovered patterns and profiles can be translated into classifiers for detecting deviations from normal usage patterns. Among promising mining methods are association rules, link analysis, and rule-induction algorithms. Our particular contribution is a unique approach to combining association rules with link analysis and a rule-induction algorithm to augment intrusion detection systems.
引用
下载
收藏
页数:10
相关论文
共 50 条
  • [21] A Modular Data Mining Architecture for Intrusion Detection Systems' Data
    Xynos, Konstantinos
    Blyth, Andrew
    PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 229 - 237
  • [22] Data warehousing and data mining techniques for intrusion detection systems
    Anoop Singhal
    Sushil Jajodia
    Distributed and Parallel Databases, 2006, 20 : 149 - 166
  • [23] Data warehousing and data mining techniques for intrusion detection systems
    Singhal, Anoop
    Jajodia, Sushil
    DISTRIBUTED AND PARALLEL DATABASES, 2006, 20 (02) : 149 - 166
  • [24] A host-based real-time intrusion detection system with data mining and forensic techniques
    Leu, FY
    Yang, TY
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 580 - 586
  • [25] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [26] Intrusion Detection Models Based on Data Mining
    Mao, Guojun
    Wu, Xindong
    Jiang, Xuxian
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2012, 5 (01): : 30 - 38
  • [27] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [28] Data Mining Implementation for Monitoring Network Intrusion
    Andarrachmi, Annisa
    Wibowo, Wahyu Catur
    2019 3RD INTERNATIONAL CONFERENCE ON INFORMATICS AND COMPUTATIONAL SCIENCES (ICICOS 2019), 2019,
  • [29] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [30] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30