A framework for constructing features and models for intrusion detection systems

Author:

Lee Wenke1,Stolfo Salvatore J.2

Affiliation:

1. Georgia Institute of Technology, Atlanta

2. Columbia Univ., New York, NY

Abstract

Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today's network environments, we need a more systematic and automated IDS development process rather that the pure knowledge encoding and engineering approaches. This article describes a novel framework, MADAM ID, for Mining Audit Data for Automated Models for Instrusion Detection. This framework uses data mining algorithms to compute activity patterns from system audit data and extracts predictive features from the patterns. It then applies machine learning algorithms to the audit records taht are processed according to the feature definitions to generate intrusion detection rules. Results from the 1998 DARPA Intrusion Detection Evaluation showed that our ID model was one of the best performing of all the participating systems. We also briefly discuss our experience in converting the detection models produced by off-line data mining programs to real-time modules of existing IDSs.

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference30 articles.

1. Mining association rules between sets of items in large databases

2. ANDERSON D. FRIVOLD T. AND VALDES A. 1995. Next-generation intrusion detection expert system (NIDES): A summary. SRI-CSL-95-07 (May). ANDERSON D. FRIVOLD T. AND VALDES A. 1995. Next-generation intrusion detection expert system (NIDES): A summary. SRI-CSL-95-07 (May).

Cited by 381 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Bootstrap and MRCD Estimators in Hotelling’s T2 Control Charts for Precise Intrusion Detection;Applied Sciences;2024-09-06

2. Cybersecurity Strategic Plan Part 2;International Journal of Latest Technology in Engineering Management & Applied Science;2024-08-21

3. CICIoV2024: Advancing realistic IDS approaches against DoS and spoofing attack in IoV CAN bus;Internet of Things;2024-07

4. Stealthy Adversarial Attacks on Intrusion Detection Systems: A Functionality-Preserving Approach;2024 International Wireless Communications and Mobile Computing (IWCMC);2024-05-27

5. Evolving random weight neural networks based on oversampled-segmented examples for IoT intrusion detection;The Journal of Supercomputing;2024-04-11

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3