Forensic Data Mining: Finding Intrusion Patterns in Evidentiary Data

被引:0
|
作者
Hansen, James V. [1 ]
Lowry, Paul Benjamin [1 ]
Meservy, Rayman D. [1 ]
机构
[1] Brigham Young Univ, Marriott Sch, Dept Informat Syst, Provo, UT 84602 USA
来源
关键词
Data mining; intrusion detection; pattern discovery; rule-induction algorithms; link analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In The extensive growth of computing networks and tools and tricks for intruding into and attacking networks has underscored the importance of intrusion detection in network security. Yet, contemporary intrusion detection systems (IDS) are limiting in that they typically employ a misuse detection strategy, with searches for patterns of program or user behavior that match known intrusion scenarios, or signatures. Accordingly, there is a need for more robust and adaptive methods for designing and updating intrusion detection systems. One promising approach is the use of data mining methods for discovering intrusion patterns. Discovered patterns and profiles can be translated into classifiers for detecting deviations from normal usage patterns. Among promising mining methods are association rules, link analysis, and rule-induction algorithms. Our particular contribution is a unique approach to combining association rules with link analysis and a rule-induction algorithm to augment intrusion detection systems.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Data mining-based intrusion detectors
    Wu, Su-Yun
    Yen, Ester
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (03) : 5605 - 5612
  • [42] Intrusion scenarios detection based on data mining
    Ding, Yu-Xin
    Wang, Hai-Sen
    Liu, Qing-Wei
    PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
  • [43] Hybrid intrusion detection based on data mining
    Zhang, Lei
    Zhang, Jianqing
    Chen, Yong
    Liao, Shaowen
    2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
  • [44] A New Model of Intrusion Detection Based on Data Warehouse and Data Mining
    Qi, Bei
    Dong, Yunfeng
    MANUFACTURING SCIENCE AND TECHNOLOGY, PTS 1-8, 2012, 383-390 : 303 - +
  • [45] Data Mining applied to Forensic Speaker Identification
    Univaso, P.
    Ale, J. M.
    Gurlekian, J. A.
    IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (04) : 1098 - 1111
  • [46] A digital forensic model based on data mining
    Cheng, Peng
    Qu, Hui
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INFORMATION SCIENCES, MACHINERY, MATERIALS AND ENERGY (ICISMME 2015), 2015, 126 : 1206 - 1209
  • [47] Mining of Classification Patterns in Clinical Data through Data Mining Algorithms
    Jacob, Shomona Gracia
    Ramani, R. Geetha
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 997 - 1003
  • [48] Data Generation and Analysis for Digital Forensic Application using Data Mining
    Khobragade, Prashant K.
    Malik, Latesh G.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 458 - 462
  • [49] Frequent Pattern Mining Algorithms for Finding Associated Frequent Patterns for Data Streams: A Survey
    Nasreen, Shamila
    Azam, Muhammad Awais
    Shehzad, Khurram
    Naeem, Usman
    Ghazanfar, Mustansar Ali
    5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 : 109 - +
  • [50] Finding patterns in three-dimensional graphs: Algorithms and applications to scientific data mining
    Wang, X
    Wang, JTL
    Shasha, D
    Shapiro, BA
    Rigoutsos, I
    Zhang, KZ
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2002, 14 (04) : 731 - 749