DocumentCode :
397890
Title :
Adaptive intrusion detection with data mining
Author :
Hossain, Mahmood ; Bridges, Susan M. ; Vaughn, Rayford B., Jr.
Author_Institution :
Dept. of Comput. Sci. & Eng., Mississippi State Univ., MS, USA
Volume :
4
fYear :
2003
fDate :
5-8 Oct. 2003
Firstpage :
3097
Abstract :
A major constraint of an anomaly-based intrusion detection system (IDS) lies in its inability to adapt to distinguish these changes from intrusive behavior. To overcome these obstacles, the normal profile must be updated at regular intervals. The naive approach of exhaustively recomputing the normal profile is often not viable and can incorporate patterns of intrusive behavior as normal. We address technical issues and present an adaptive data mining framework for anomaly detection. We employ a sliding window approach and use only the audit data inside that sliding window to update the profile. Instead of performing an exhaustive update, we use some heuristics to decide when to update. Experimental results using real network traffic data (containing simulated intrusion attacks) demonstrate the effectiveness of the proposed framework.
Keywords :
adaptive systems; data mining; fuzzy set theory; heuristic programming; safety systems; security of data; user interfaces; adaptive data mining framework; anomaly-based intrusion detection system; audit data; fuzzy association; heuristics; intrusive behavior; real network traffic data; simulated intrusion attacks; sliding window approach; Association rules; Bridges; Buffer overflow; Computer science; Data mining; Databases; Floods; Intrusion detection; Laboratories; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man and Cybernetics, 2003. IEEE International Conference on
ISSN :
1062-922X
Print_ISBN :
0-7803-7952-7
Type :
conf
DOI :
10.1109/ICSMC.2003.1244366
Filename :
1244366
Link To Document :
بازگشت