Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

被引:0
|
作者
Hansen, James V. [1 ]
Lowry, Paul Benjamin [1 ]
Meservy, Rayman D. [1 ]
机构
[1] Brigham Young Univ, Marriott Sch, Dept Informat Syst, Provo, UT 84602 USA
来源
关键词
Data mining; intrusion detection; pattern discovery; rule-induction algorithms; link analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In The extensive growth of computing networks and tools and tricks for intruding into and attacking networks has underscored the importance of intrusion detection in network security. Yet, contemporary intrusion detection systems (IDS) are limiting in that they typically employ a misuse detection strategy, with searches for patterns of program or user behavior that match known intrusion scenarios, or signatures. Accordingly, there is a need for more robust and adaptive methods for designing and updating intrusion detection systems. One promising approach is the use of data mining methods for discovering intrusion patterns. Discovered patterns and profiles can be translated into classifiers for detecting deviations from normal usage patterns. Among promising mining methods are association rules, link analysis, and rule-induction algorithms. Our particular contribution is a unique approach to combining association rules with link analysis and a rule-induction algorithm to augment intrusion detection systems.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [32] Intrusion Detection Using Data Mining with Correlation
    Singh, Varsha
    Puthran, Shubha
    Tiwari, Avanish
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 620 - 625
  • [33] Adaptive Intrusion Detection: A Data Mining Approach
    Wenke Lee
    Salvatore J. Stolfo
    Kui W. Mok
    Artificial Intelligence Review, 2000, 14 : 533 - 567
  • [34] A Comparison of Data Mining Techniques for Intrusion Detection
    Naidu, R. China Appala
    Avadhani, P. S.
    2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44
  • [35] Adaptive intrusion detection: A data mining approach
    Lee, WK
    Stolfo, SJ
    Mok, KW
    ARTIFICIAL INTELLIGENCE REVIEW, 2000, 14 (06) : 533 - 567
  • [36] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [37] Applying Data Mining Techniques to Intrusion Detection
    Ng, Jonathon
    Joshi, Deepti
    Banik, Shankar M.
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
  • [38] Intrusion Detection Models Based on Data Mining
    Guojun Mao
    Xindong Wu
    Xuxian Jiang
    International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
  • [39] Research on intrusion detection based on data mining
    Tong, Xiaojun
    Cui, Minggen
    Wang, Jie
    PROGRESS IN INTELLIGENCE COMPUTATION AND APPLICATIONS, PROCEEDINGS, 2007, : 444 - 447
  • [40] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259