Abstract
In this paper, we apply data mining techniques to construct intrusion detection patterns. We mine both system audit data and network traffic data for consistent and useful patterns of program and user behavior, and use an iterative low-frequency-finder mining algorithm to find the low frequency but important patterns.
This work is supported by grants from 973, 863 and the National Natural Science Foundation of China (Grant No. #90104002 & #2003CB314800 & #2003AA142080 & #60203044) and NISAC 2004-R-3-917-A-01.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H., Verkamo, A.I.: Finding inter-esting rules from large sets of discovered association rules. In: Proceedings of the 6rd Interna-tional Conference on Information and Knowledge Management, Gainthersburg, MD (2002)
Srikant, R., Vu, Q., Agrawal, R.: Mining association rules with item constraints. In: Pro-ceedings of the 8rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, California (August 2001)
Padmanabhan, B., Tuzhilin, A.: A belief-driven method for discovering unexpected pat-terns. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, New York, NY, August 1998, AAAI Press, Menlo Park (1998)
Liu, W.: Study on Intrusion Detection Technology with Traceback and Isolation of Attack-ing Sources, PhD Thesis (2004)
Han, J., Fu, Y.: Discovery of multiple-level association rules from large databases. In: Proceedings of the 21th VLDB Conference, Zurich, Switzerland (1995)
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21(3), 181–199 (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, W., Wu, JP., Duan, HX., Li, X. (2005). New Algorithm Mining Intrusion Patterns. In: Wang, L., Jin, Y. (eds) Fuzzy Systems and Knowledge Discovery. FSKD 2005. Lecture Notes in Computer Science(), vol 3614. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11540007_96
Download citation
DOI: https://doi.org/10.1007/11540007_96
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28331-7
Online ISBN: 978-3-540-31828-6
eBook Packages: Computer ScienceComputer Science (R0)