Title :
Prediction of DoS attack sequences
Author :
Reshamwala, Alpa ; Mahajan, Sunita
Author_Institution :
Comput. Eng. Dept., SVKM´´s NMIMS Univ., Mumbai, India
Abstract :
A denial of service attack (DOS) is any type of attack on a networking structure to disable a server from servicing its clients. Attacks range from sending millions of requests to a server in an attempt to slow it down, flooding a server with large packets of invalid data, to sending requests with an invalid or spoofed IP address. Sequential pattern mining is an important data mining problem with broad applications. Sequential Pattern Mining is to discover the frequent sequential pattern in the sequential event dataset. Intrusion detection using sequential pattern mining is a research focusing on the field of information security. In this paper, we have implemented Apriori a candidate generation algorithm and PrefixSpan a pattern growth algorithm on a network intrusion dataset from KDD Cup 1999, 10 percent of training dataset, which is the annual Data Mining and Knowledge Discovery competition organized by ACM Special Interest Group on Knowledge Discovery and Data Mining, the leading professional organization of data miners. To address the absence of timestamp in the dataset, we considered two approaches to generate the sequence database from the dataset. One is by taking service as reference attribute and the other one by taking a timestamp window of size one day (86400 seconds). We found that experimental results of PrefixSpan for predicting DoS attacks sequences on KDD cup 99 training dataset are efficient. These results are then compared with SPAM (Sequential Pattern Mining) algorithm which uses vertical bitmap data layout allowing for simple, efficient counting.
Keywords :
computer network security; data mining; fuzzy set theory; ACM Special Interest Group; Apriori algorithm; DoS attack sequence prediction; KDD cup 99 training dataset; PrefixSpan algorithm; SPAM algorithm; candidate generation algorithm; data mining; denial of service attack; flooding; frequent sequential pattern discovery; information security; knowledge discovery; network intrusion dataset; networking structure; pattern growth algorithm; professional organization; sequence database generation; sequential pattern mining; spoofed IP address; timestamp window; training dataset; vertical bitmap data layout; Algorithm design and analysis; Classification algorithms; Computer crime; Data mining; Databases; Prediction algorithms; Unsolicited electronic mail; Data mining; DoS attacks; fuzzy sets; intrusion detection system; sequence data; time interval;
Conference_Titel :
Communication, Information & Computing Technology (ICCICT), 2012 International Conference on
Conference_Location :
Mumbai
Print_ISBN :
978-1-4577-2077-2
DOI :
10.1109/ICCICT.2012.6398148