Intrusion detection based on clustering a data stream

被引:0
|
作者
Oh, SH [1 ]
Kang, JS [1 ]
Byun, YC [1 ]
Park, GL [1 ]
Byun, SY [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In anomaly intrusion detection, how to model the normal behavior of activities performed by a user is an important issue. To extract the normal behavior as a profile, conventional data mining techniques are widely applied to a finite audit data set. However, these approaches can only model the static behavior of a user in the audit data set. This drawback can be overcome by viewing the continuous activities of a user as an audit data stream. This paper proposes a new clustering algorithm which continuously models a data stream. A set of features is used to represent the characteristics of an activity. For each feature, the clusters of feature values corresponding to activities observed so far in an audit data stream are identified by the proposed clustering algorithm for data streams. As a result, without maintaining any historical activity of a user physically, new activities of the user can be continuously reflected to the on-going result of clustering.
引用
收藏
页码:220 / 227
页数:8
相关论文
共 50 条
  • [1] Anomaly intrusion detection based on clustering a data stream
    Oh, Sang-Hyun
    Kang, Jin-Suk
    Bytin, Yung-Cheol
    Jeong, Taikyeong T.
    Lee, Won-Suk
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
  • [2] Grid-based data stream clustering for intrusion detection
    [J]. Quan, Q. (qqian@shu.edu.cn), 1600, Femto Technique Co., Ltd. (15):
  • [3] An Intrusion Detection Method Based on Damped Window of Data Stream Clustering
    Li, Shengnan
    Zhou, Xiaofeng
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 1, 2017, : 211 - 214
  • [4] Data Stream Clustering Algorithm Based on Bucket Density for Intrusion Detection
    Yin, Chunyong
    Xia, Lian
    Wang, Jin
    [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 846 - 850
  • [5] Intrusion detection algorithm based on SSC-tree stream clustering
    Cheng, Chun-Ling
    Yu, Zhi-Hu
    Zhang, Deng-Yin
    Xu, Xiao-Long
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2012, 34 (03): : 625 - 630
  • [6] An Intrusion Detection mechanism based on feature based data clustering
    Das, Debasish
    Sharma, Utpal
    Bhattacharyya, D. K.
    [J]. 2008 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2008, : 172 - 175
  • [7] Anomaly detection model based on data stream clustering
    Chunyong Yin
    Sun Zhang
    Zhichao Yin
    Jin Wang
    [J]. Cluster Computing, 2019, 22 : 1729 - 1738
  • [8] Anomaly detection model based on data stream clustering
    Yin, Chunyong
    Zhang, Sun
    Yin, Zhichao
    Wang, Jin
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1729 - 1738
  • [9] A Web Intrusion Detection Mechanism based on Feature based Data Clustering
    Das, Debasish
    Sharma, Utpal
    Bhattacharyya, D. K.
    [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1123 - 1128
  • [10] Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System
    Yang, Yihong
    Xu, Xiaolong
    Wang, Lina
    Zhong, Weiyi
    Yan, Chao
    Qi, Lianyong
    [J]. PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 87 - 91