A sequential pattern mining algorithm for misuse intrusion detection

被引:0
|
作者
Song, SJ [1 ]
Huang, ZG [1 ]
Hu, HP [1 ]
Jin, SY [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a sequential pattern mining algorithm for misuse intrusion detection, which can be used to detect application layer attack. The algorithm can distinguish the order of attack behavior, and overcome the limitation of Wenke Lee's method, which performs statistical analysis against intrusion behavior at the network layer with frequent episode algorithm. The algorithm belongs to behavior analysis technique based on protocol analysis. The preprocessed data of the algorithm are application layer connection records extracted from DARPA's tcpdump data by protocol analysis tools. We use vertical item-transaction data structure in the algorithm. Compared with AprioriAll algorithm, the complexity of this algorithm is decreased greatly. Using this algorithm, we dig out an "intrusion-only" itemset sequential pattern, which is different from normal user command sequential pattern. Experiments indicate that our algorithm describes attacks more accurately, and it can detect those attacks whose features appear only once. Our presentation offers a new approach for the research of misuse intrusion detection.
引用
收藏
页码:458 / 465
页数:8
相关论文
共 50 条
  • [1] RETRACTED ARTICLE: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm
    Yazi Wang
    Yingbo Liang
    Huaibo Sun
    Yuankun Ma
    Cluster Computing, 2020, 23 : 1927 - 1936
  • [2] Retraction Note: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm
    Yazi Wang
    Yingbo Liang
    Huaibo Sun
    Yuankun Ma
    Cluster Computing, 2023, 26 : 7 - 7
  • [3] An efficient mining algorithm for frequent pattern in intrusion detection
    Li, QH
    Xiong, JJ
    Yang, HB
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 138 - 142
  • [4] Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data
    Fidalcastro, A.
    Baburaj, E.
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (10): : 5003 - 5018
  • [5] A scalable sequential pattern mining algorithm
    Wang, Jiahong
    Asanuma, Yoshiaki
    Kodama, Eiichiro
    Takata, Toyoo
    2006 IEEE INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1-3, 2006, : 437 - +
  • [6] RETRACTION: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm (Retraction of Vol 23, Pg 1927, 2020)
    Wang, Yazi
    Liang, Yingbo
    Sun, Huaibo
    Ma, Yuankun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (Suppl 1): : 7 - 7
  • [7] RETRACTED: Intrusion detection and performance simulation based on improved sequential pattern mining algorithm (Retracted article. See DEC, 2022)
    Wang, Yazi
    Liang, Yingbo
    Sun, Huaibo
    Ma, Yuankun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 1927 - 1936
  • [8] Sequential Pattern Mining Algorithm Based on Interestingness
    Li, Tao
    Zhang, Shuaichi
    Chen, Hui
    Ren, Yongjun
    Li, Xiang
    Ren, Yongzhen
    2018 FIRST INTERNATIONAL COGNITIVE CITIES CONFERENCE (IC3 2018), 2018, : 69 - 74
  • [9] A Improved PrefixSpan Algorithm For Sequential Pattern Mining
    Dong, Liang
    Hong, Wang
    2014 5TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2014, : 377 - 380
  • [10] Research on parallel algorithm for sequential pattern mining
    Zhou, Lijuan
    Qin, Bai
    Wang, Yu
    Hao, Zhongxiao
    DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2008, 2008, 6973