A sequential pattern mining algorithm for misuse intrusion detection

被引:0
|
作者
Song, SJ [1 ]
Huang, ZG [1 ]
Hu, HP [1 ]
Jin, SY [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a sequential pattern mining algorithm for misuse intrusion detection, which can be used to detect application layer attack. The algorithm can distinguish the order of attack behavior, and overcome the limitation of Wenke Lee's method, which performs statistical analysis against intrusion behavior at the network layer with frequent episode algorithm. The algorithm belongs to behavior analysis technique based on protocol analysis. The preprocessed data of the algorithm are application layer connection records extracted from DARPA's tcpdump data by protocol analysis tools. We use vertical item-transaction data structure in the algorithm. Compared with AprioriAll algorithm, the complexity of this algorithm is decreased greatly. Using this algorithm, we dig out an "intrusion-only" itemset sequential pattern, which is different from normal user command sequential pattern. Experiments indicate that our algorithm describes attacks more accurately, and it can detect those attacks whose features appear only once. Our presentation offers a new approach for the research of misuse intrusion detection.
引用
收藏
页码:458 / 465
页数:8
相关论文
共 50 条
  • [31] A Improved Sequential Pattern Mining Algorithm Based on PrefixSpan
    Xue Fei
    Shan Zheng
    Yan Li-jing
    Fan Chao
    2016 WORLD AUTOMATION CONGRESS (WAC), 2016,
  • [32] ACV constraint based sequential pattern mining algorithm
    Ye, Hong-Yun
    Ni, Zhi-Wei
    Ni, Li-Ping
    Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence, 2010, 23 (06): : 802 - 808
  • [33] A New Algorithm for Mining Weighted Closed Sequential Pattern
    Li, Jinhong
    Yang, Bingru
    Song, Wei
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 1, 2009, : 338 - +
  • [34] A Network Intrusion Detection Algorithm Based on Outlier Mining
    Ding, Tianyi
    Zhang, Min
    He, Dongjie
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
  • [35] Sequential pattern analysis for event-based intrusion detection
    Nisha T.N.
    Pramod D.
    International Journal of Information and Computer Security, 2019, 11 (4-5) : 476 - 492
  • [36] An improved algorithm for fuzzy data mining for intrusion detection
    Florez, G
    Bridges, SM
    Vaughn, RB
    2002 ANNUAL MEETING OF THE NORTH AMERICAN FUZZY INFORMATION PROCESSING SOCIETY PROCEEDINGS, 2002, : 457 - 462
  • [37] Discriminative Sequential Pattern Mining for Software Failure Detection
    Du, Hao
    Su, Yongchi
    Li, Chunping
    INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 153 - 158
  • [38] Malicious sequential pattern mining for automatic malware detection
    Fan, Yujie
    Ye, Yanfang
    Chen, Lifei
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 52 : 16 - 25
  • [39] Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Yang, Wenjun
    SENSORS, MECHATRONICS AND AUTOMATION, 2014, 511-512 : 1178 - 1184
  • [40] A Survey of Pattern Matching Algorithm in Intrusion Detection System
    Gharaee, Hossein
    Seifi, Shokoufeh
    Monsefan, Nima
    2014 7th International Symposium on Telecommunications (IST), 2014, : 946 - 953