Title : 
Research and Design for Intrusion Detection System with Hybrid Detector and Apriori Algorithm
         
        
            Author : 
Zhao, Duanyang ; Xu, Qingxiang ; Feng, Zhilin
         
        
            Author_Institution : 
Zhijiang Coll., Zhejiang Univ. of Technol., Hangzhou, China
         
        
        
        
        
        
            Abstract : 
Network and host Intrusion Detection Systems (IDS) have become a standard component in security infrastructures. As the action of intrusion represents variable, complicated, and uncertainty characteristic, they face so many problems to resolve for intrusion detection. Each approach has its strengths and weaknesses. We propose a hybrid IDS, which combines network and host IDS, with anomaly and misuse detection mode, utilizes auditing programs to extract an extensive set of features that describe each network connection or host session, and applies data mining programs to learn rules that accurately capture the behavior of intrusions and normal activities. We use an association rule to track all relevant data dependency rule sets for different access roles using a hierarchical structure. We identify malicious transactions from the transaction logs in the database using the data dependency rule sets. These rule sets are continuously updated and stored in a repository. The optimized algorithm actually improves the performance of IDS. Our approach is shown to reduce data access bottlenecks, and ensures minimal manual intervention for maintaining a secure database.
         
        
            Keywords : 
data mining; design; security of data; anomaly detection mode; apriori algorithm; association rule; data mining programs; hybrid detector; intrusion detection system; misuse detection mode; security infrastructures; Algorithm design and analysis; Computer science; Content addressable storage; Data analysis; Data mining; Data security; Detectors; Educational institutions; Intrusion detection; Transaction databases;
         
        
        
        
            Conference_Titel : 
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
         
        
            Conference_Location : 
Wuhan
         
        
            Print_ISBN : 
978-1-4244-5893-6
         
        
            Electronic_ISBN : 
978-1-4244-5895-0
         
        
        
            DOI : 
10.1109/EBISS.2010.5473646