New Algorithm Mining Intrusion Patterns | SpringerLink
Skip to main content

New Algorithm Mining Intrusion Patterns

  • Conference paper
Fuzzy Systems and Knowledge Discovery (FSKD 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3614))

Included in the following conference series:

  • 964 Accesses

Abstract

In this paper, we apply data mining techniques to construct intrusion detection patterns. We mine both system audit data and network traffic data for consistent and useful patterns of program and user behavior, and use an iterative low-frequency-finder mining algorithm to find the low frequency but important patterns.

This work is supported by grants from 973, 863 and the National Natural Science Foundation of China (Grant No. #90104002 & #2003CB314800 & #2003AA142080 & #60203044) and NISAC 2004-R-3-917-A-01.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H., Verkamo, A.I.: Finding inter-esting rules from large sets of discovered association rules. In: Proceedings of the 6rd Interna-tional Conference on Information and Knowledge Management, Gainthersburg, MD (2002)

    Google Scholar 

  2. Srikant, R., Vu, Q., Agrawal, R.: Mining association rules with item constraints. In: Pro-ceedings of the 8rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, California (August 2001)

    Google Scholar 

  3. Padmanabhan, B., Tuzhilin, A.: A belief-driven method for discovering unexpected pat-terns. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, New York, NY, August 1998, AAAI Press, Menlo Park (1998)

    Google Scholar 

  4. Liu, W.: Study on Intrusion Detection Technology with Traceback and Isolation of Attack-ing Sources, PhD Thesis (2004)

    Google Scholar 

  5. Han, J., Fu, Y.: Discovery of multiple-level association rules from large databases. In: Proceedings of the 21th VLDB Conference, Zurich, Switzerland (1995)

    Google Scholar 

  6. Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, W., Wu, JP., Duan, HX., Li, X. (2005). New Algorithm Mining Intrusion Patterns. In: Wang, L., Jin, Y. (eds) Fuzzy Systems and Knowledge Discovery. FSKD 2005. Lecture Notes in Computer Science(), vol 3614. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11540007_96

Download citation

  • DOI: https://doi.org/10.1007/11540007_96

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28331-7

  • Online ISBN: 978-3-540-31828-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics