Classification of IDS Alerts with Data Mining Techniques
|
|
|
- Brent Hubbard
- 9 years ago
- Views:
Transcription
1 International Journal of Electronic Commerce Studies Vol.5, No.1, pp.1-6, 2014 Classification of IDS Alerts with Data Mining Techniques Hany Nashat Gabra Computer and Systems Engineering Department, Ain Shams University, Cairo, Egypt. Dr. Ayman M. Bahaa-Eldin Computer and Systems Engineering Department, Ain Shams University, Cairo, Egypt. Prof. Huda Korashy Computer and Systems Engineering Department, Ain Shams University, Cairo, Egypt. ABSTRACT Intrusion detection systems (IDSs) have become a widely used measure for security systems. The main problem for those systems results is the irrelevant alerts on those results. We will propose a data mining based method for classification to distinguish serious alerts and irrelevant one with a performance of 99.9 % which is better in comparison with the other recent data mining methods that have reached the performance of 97%. A ranked alerts list also created according to alert s importance to minimize human interventions. Keyword: Intrusion Detection, Data Mining, Frequent Pattern, Frequent Itemset 1. INTRODUCTION An IDS sensor can generate thousands of alerts in a day [1, 2]. Often vast majority of the alerts are false positives or of low importance [3,1]. More than 90% of those alerts being irrelevant [4, 5, 6] so an IDS alert log s analysis techniques are often used to distinguish the important IDS alerts from irrelevant events. Our result showed that the performance has been enhanced as we reduced the number of irrelevant alerts to 99.9 % in comparable with the performance of other recent techniques that reduced the number of irrelevant alerts by 74-97% only [4, 2, 7, 8, 1]. 2. RELATED WORK Data mining techniques first used for knowledge discovery from telecommunication event logs more than a decade ago [9]. Clifton and Gengo [10] have investigated the
2 International Journal of Electronic Commerce Studies 2 detection of frequent alert sequences and enhanced by Ferenc [11], Walter A. Kosters and Wim Pijls [12] this knowledge for creating IDS alert filters. Long et al [3] suggested a snort clustering algorithm. During the last 10 years, data mining based methods have also been proposed in many research papers [4, 5, 10, 3, 7, 8]. 3. Mining Frequent Patterns Mining frequent itemsets from a database has been solved largely by algorithms that are Apriori based and those that are pattern-tree growth techniques. Algorithms for mining of all existing techniques do not include generating frequent patterns for each transaction as needed for many applications. Table 1: Example Alerts/items Data set Records Alerts Item Alert Alert Alert Assume a data set which contains alert records generated by an IDS system in Table 1 where the set of items I = {1, 2, 3, 16, 20} and the set of Alerts = {Alert1, Alert2, Alert3}.Mining all alerts that have similar frequent itemset at minimum support of 50% would require generating frequent itemsets with the alerts in the format [< itemset > Alert-list]. We proposed the AlertFp algorithm for mining frequent patterns with the Alerts where they occurred. Mining Fps with Alerts on an IDS log is an important goal of this algorithm where we are linking all frequent patterns to the alert transactions where they came from. Then count the number of frequent patter founded on each transaction. Finally all transactions in the dataset re-sorted according to the number of the related frequent patters. AlertFp algorithm represents each frequent k-pattern as form < Fk1, Alert1k1, Alert2k1,..., Alertmk1>, where Fk1is the first frequent k-pattern, and Alertmk1 is the mth Alert of the first frequent k-pattern. Thus, with this AlertFp technique the data set is scanned to obtain the candidate 1-itemsets with a list of their Alerts. The Alerts of each candidate pattern is implemented. Then, the count of each candidate pattern s Alerts is equivalent to the support of the pattern. After applying the frequent pattern mining algorithm to past IDS alert logs (AlertFp) to discover patterns that describe redundant alerts. Alert weight is measured by calculating Frequent Pattern Outlier Factor (FPOF) for each alert s transaction. FPOP (t) =
3 International Journal of Electronic Commerce Studies 3 The interpretation of the above formula follows [19]. If a transaction t contains more frequent patterns, its FPOF value will be big, which indicates that it is unlikely to be an outlier. In contrast, transactions with small FPOF values are likely to be outliers or to be considered as an interesting alert to be investigated by the security analyst. By using x s and re-order the IDS alerts by the simple FPOF for simplicity we will have the important alerts on the top of IDS log and irrelevant alerts will be pushed to the end of the log file. Algorithm 1. (Alert:Computing Frequent Patterns with Alerts) Algorithm AlertFp() Input: A list of k-items, Alert Set of k-alerts, mini-support s. Output: A list of frequent patterns Fps and the relative Alert. Begin 1. Scan the Data Set once to compute 2. Compute frequent pattern F1 from candidate k-itemsets C1 as F1 = {list of k itemset with Alertslist count minsupport, Alert1counter}. 3. For Fi < k i=1 m=0 Counter=0 do Begin 3.1. If Fi Alertmi then counter(m) i = i+1, m=m Compute the next candidate set Ci+1 as F1 End 4. CASE STUDY Snort [22] used in IDS sensor package that applies attack signatures for detecting suspicious network traffic and can emit alerts as syslog. Consider the below Snort sample (figure 1). This sample will be used to simply clarify the idea WEB-MISC/doc/access /11/2010 8:57 AM , WEB-MISC/robots.txt/access /11/2010 8:57 AM , WEB-MISC/robots.txt/access /11/2010 8:59 AM , Figure 1. Snort alerts sample The frequent patterns discovered from the sample IDS log as shown in figure 2.
4 International Journal of Electronic Commerce Studies 4 * * * * *, t1, t2,t3 Support: 3 * * * * 25, t1, t2,t3 Support: 3 7 * * * (25), t1, t2,t3 Support: 3 (7) * * * (25) 2, t1, t2,t3 Support: 3 (7) * 508 * (25) (2), t1, t2,t3 Support: 3 (7) * (508) * (25) (2) * * * * 6, t1, t2,t3 Support: 3 (7) * (508) * (25) (2) * * * * (6) * 80, t1, t2,t3 Support: 3 (7) * (508) WEB-MISC/robots.txt/access (25) (2) * * * * (6) * (80), t1, t2 Support: 2 (7) * (508) * (25) (2) * 8:57AM * * (6) * (80), t1, t2 Support: 2 (7) * (508) * (25) (2) 6/11/2010 (8:57AM) * * (6) * (80), t1, t2 Support: 2 Figure 2. Sample alert patterns Finally the alerts are sorted in ascending order according to their simple FPOF and top p% of them is put into the set of candidate true alerts. The alerts are sorted in ascending order according to their weight (FPOF) as shown in figure 3. simple FPOF t(3) = WEB-MISC/robots.txt/access /11/2010 8:59AM , simple FPOF t(1) = WEB-MISC/doc/access /11/2010 8:57AM , simple FPOF t(2) = WEB-MISC/robots.txt/access /11/2010 8:57AM , Figure 3. Output sample 5. IMPLEMENTATION AND PERFORMANCE In this section, we describe our classifier implementation and experiments. In our setup, alerts sorted in a new separate log file for further review. Classifiers are rebuilt every midnight using the IDS sensor log data. Once the frequent pattern has been detected, it will be used for further alert classification. This allows for the classifier to adapt to new routine alert patterns with a reasonable learning time. The Outlier Factor will be calculated for each transaction, and then we will re-sort the transactions accordingly. In our experiments we have applied 5 artificial hacks from a specific source IP to be monitored on our result. Table 2 presents our experiment results on 22 June 2010 sample (with 28,670 records) Table 2: Experimental results mini-support frequent itemsets attempted 5 attacks place reduction first 7 records % first 24 records % first 34 records %
5 International Journal of Electronic Commerce Studies 5 During the experiments, we measured the system reliability and accuracy (figure 4) for different support values comparable with the original attempted attacks and its place in the output file. Figure4. mini support value vs. the 5 attacks in output 7. OPEN ISSUES AND FUTURE WORK In this paper, we have presented a novel data mining based IDS alert classification method sorted for the security analysts according to the alert importance. Although our preliminary results are promising, one issue remains open major changes in the arrival rate of routine alerts might be symptoms of large scale attacks, but are hard to detect. However, this is an inherent weakness of alert classification and sorting systems (e.g., see [6, 20, 13] for a related discussion). For the future work, we plan to research our classification method further, and study various statistical algorithms (e.g., time series analysis) for detecting unexpected fluctuations in the arrival rates of routine alerts. 8. REFERENCES [1] Risto Vaarandi Real-time classification of IDS alerts with data mining techniques, Proceedings of the 2009 IEEE MILCOM. [2] J. Viinikka, H. Debar, L. Mé, A. Lehikoinen, and M. Tarvainen, Processing intrusion detection alert aggregates with time series modeling, Information Fusion Journal [3] J. Long, D. Schwartz, and S. Stoecklin. Distinguishing False from True Alerts in Snort by Data Mining Patterns of Alerts, in Proc. of 2006 SPIE Defense and Security Symposium, pp B B-10. [4] K. Julisch and M. Dacier. Mining intrusion detection alarms for actionable knowledge 2002 ACM SIGKDD Knowledge Discovery and Data Mining conference, pp [5] K. Julisch. Clustering Intrusion Detection Alarms to Support Root Cause Analysis, in ACM Transactions on Information and System Security, vol. 6(4), 2003, pp [6] J. Viinikka, H. Debar, L. Mé, and R. Séguier. Time Series Modeling for IDS Alert Management, in Proc. Of 2006 ACM Symposium on Information, Computer and Communications Security, pp [7] S. O. Al-Mamory, H. Zhang, and A. R. Abbas. IDS Alarms Reduction by Data
6 International Journal of Electronic Commerce Studies 6 Mining, in Proc. of 2008 IEEE World Congress on Computational Intelligence, pp [8] S. O. Al-Mamory and H. Zhang. Intrusion Detection Alarms Reduction by Root Cause Analysis and Clustering in Computer Communications, vol.32(2), 2009, pp [9] K. Hätönen, M. Klemettinen, H. Mannila, P.Ronkainen, and H. Toivonen. in Proc. of 1996 International Conference on Data Engineering, pp [10] C. Clifton and G. Gengo. Developing Custom Intrusion Detection Filters Using Data Mining, in Proc. of 2000 MILCOM Symposium, pp [11] Ferenc Bodon fast APRIORI implementation Informatics Laboratory, Computer and Automation Research Institute, Hungarian Academy of ciences, IEEE ICDM Workshop on Frequent Itemset Mining Implementations. [12] Walter A. Kosters and Wim Pijls Apriori, a depth-first implementation, volume 90 of CEUR Workshop Proceedings, CEUR-WS.org. [13] J. Viinikka and H. Debar. Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information, in Proc. of 2004 RAID Symposium, pp [14] B. Goethals. Frequent Pattern Mining Technical Report, University of Helsinki [15] M. J. Zaki and C.-J. Hsiao. CHARM: An Efficient Algorithm for Closed Itemset Mining, in Proc. of 2002 SIAM International Conference on Data Mining, pp [16] T. Pietraszek. Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection, in Proc. of 2004 RAID Symposium, pp [17] L. Ertoz, E. Eilertson, A. Lazarevic, et al, Detection of Novel Network Attacks Using Data Mining, Proceedings of DMSEC 2003, IEEE Press, New York, pp. 1-10, [18] P. Dokas, L. Ertoz, V. Kumar, et al, Data Mining for Network Intrusion Detection, AAAI/MIT Press, Cambridge, pp , [19] Z. He, X. Xu, J.Z. Huang, et al, FP-Outlier: Frequent Pattern Based Outlier Detection, Computer Science and Information System, 2(1), pp , [20] J. Viinikka, H. Debar, L. Mé, A. Lehikoinen, and M. Tarvainen. Processing intrusion detection alert aggregates with time series modeling, in Information Fusion Journal, [21] Risto Vaarandi Mining Event Logs with SLCT and LogHound, Proceedings of INTELLCOMM 2004: [22] Snort,
Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering
Network IDS Alert Classification with Frequent Itemset Mining and Data Clustering Risto Vaarandi and Krlis Podiš Copyright 2010 IEEE. Personal use of this material is permitted. However, permission to
False Positives Reduction Techniques in Intrusion Detection Systems-A Review
128 False Positives Reduction Techniques in Intrusion Detection Systems-A Review Asieh Mokarian, Ahmad Faraahi, Arash Ghorbannia Delavar, Payame Noor University, Tehran, IRAN Summary During the last decade
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs
A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs Risto Vaarandi Department of Computer Engineering, Tallinn University of Technology, Estonia [email protected] Abstract. Today,
Static Data Mining Algorithm with Progressive Approach for Mining Knowledge
Global Journal of Business Management and Information Technology. Volume 1, Number 2 (2011), pp. 85-93 Research India Publications http://www.ripublication.com Static Data Mining Algorithm with Progressive
Mining Event Logs with SLCT and LogHound
Mining Event Logs with SLCT and LogHound Risto Vaarandi Copyright 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional
RESEARCH PROPOSAL: AN INTRUSION DETECTION SYSTEM ALERT REDUCTION AND ASSESSMENT FRAMEWORK BASED ON DATA MINING
Journal of Computer Science, 9 (4): 421-426, 2013 ISSN 1549-3636 2013 doi:10.3844/jcssp.2013.421.426 Published Online 9 (4) 2013 (http://www.thescipub.com/jcs.toc) RESEARCH PROPOSAL: AN INTRUSION DETECTION
Bisecting K-Means for Clustering Web Log data
Bisecting K-Means for Clustering Web Log data Ruchika R. Patil Department of Computer Technology YCCE Nagpur, India Amreen Khan Department of Computer Technology YCCE Nagpur, India ABSTRACT Web usage mining
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
INTRUSION DETECTION ALARM CORRELATION: A SURVEY
INTRUSION DETECTION ALARM CORRELATION: A SURVEY Urko Zurutuza, Roberto Uribeetxeberria Computer Science Department, Mondragon University Mondragon, Gipuzkoa, (Spain) {uzurutuza,ruribeetxeberria}@eps.mondragon.edu
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis
, 23-25 October, 2013, San Francisco, USA Mining Online GIS for Crime Rate and Models based on Frequent Pattern Analysis John David Elijah Sandig, Ruby Mae Somoba, Ma. Beth Concepcion and Bobby D. Gerardo,
ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus
An Evaluation of Machine Learning Method for Intrusion Detection System Using LOF on Jubatus Tadashi Ogino* Okinawa National College of Technology, Okinawa, Japan. * Corresponding author. Email: [email protected]
Building A Smart Academic Advising System Using Association Rule Mining
Building A Smart Academic Advising System Using Association Rule Mining Raed Shatnawi +962795285056 [email protected] Qutaibah Althebyan +962796536277 [email protected] Baraq Ghalib & Mohammed
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
Intrusion Detection System for Cloud
Intrusion Detection System for Cloud First A. Ms. Deepavali P. Patil, Second B. Prof.A.C.Lomte Dept of Computer BSITOR,Pune Abstract In today s life providing security has become more cumbersome because
A New Model for Pre-analysis of Network Traffic Using Similarity Measurement
A New Model for Pre-analysis of Network Traffic Using Similarity Measurement Enas Ayman Al-Utrakchi Zarqa University/Department of Computer Science, Zarqa, 13132, Jordan [email protected] Mohammad Rasmi
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Machine Learning Log File Analysis
Machine Learning Log File Analysis Research Proposal Kieran Matherson ID: 1154908 Supervisor: Richard Nelson 13 March, 2015 Abstract The need for analysis of systems log files is increasing as systems
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Intrusion Detection System using Log Files and Reinforcement Learning
Intrusion Detection System using Log Files and Reinforcement Learning Bhagyashree Deokar, Ambarish Hazarnis Department of Computer Engineering K. J. Somaiya College of Engineering, Mumbai, India ABSTRACT
Modeling and Design of Intelligent Agent System
International Journal of Control, Automation, and Systems Vol. 1, No. 2, June 2003 257 Modeling and Design of Intelligent Agent System Dae Su Kim, Chang Suk Kim, and Kee Wook Rim Abstract: In this study,
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Slow Port Scanning Detection
Slow Port Scanning Detection Mehiar Dabbagh 1, Ali J. Ghandour 1, Kassem Fawaz 1, Wassim El Hajj 2, Hazem Hajj 1 1 Department of Electrical and Computer Engineering 2 Department of Computer Science American
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors
Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS
MINDS: A NEW APPROACH TO THE INFORMATION SECURITY PROCESS E. E. Eilertson*, L. Ertoz, and V. Kumar Army High Performance Computing Research Center Minneapolis, MN 55414 K. S. Long U.S. Army Research Laboratory
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE
DEVELOPMENT OF HASH TABLE BASED WEB-READY DATA MINING ENGINE SK MD OBAIDULLAH Department of Computer Science & Engineering, Aliah University, Saltlake, Sector-V, Kol-900091, West Bengal, India [email protected]
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
Credit Card Fraud Detection Using Self Organised Map
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Distributed Data Mining Algorithm Parallelization
Distributed Data Mining Algorithm Parallelization B.Tech Project Report By: Rishi Kumar Singh (Y6389) Abhishek Ranjan (10030) Project Guide: Prof. Satyadev Nandakumar Department of Computer Science and
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
Preprocessing Web Logs for Web Intrusion Detection
Preprocessing Web Logs for Web Intrusion Detection Priyanka V. Patil. M.E. Scholar Department of computer Engineering R.C.Patil Institute of Technology, Shirpur, India Dharmaraj Patil. Department of Computer
A Novel Approach for Network Traffic Summarization
A Novel Approach for Network Traffic Summarization Mohiuddin Ahmed, Abdun Naser Mahmood, Michael J. Maher School of Engineering and Information Technology, UNSW Canberra, ACT 2600, Australia, [email protected],[email protected],M.Maher@unsw.
Enhancing Quality of Data using Data Mining Method
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 9, SEPTEMBER 2, ISSN 25-967 WWW.JOURNALOFCOMPUTING.ORG 9 Enhancing Quality of Data using Data Mining Method Fatemeh Ghorbanpour A., Mir M. Pedram, Kambiz Badie, Mohammad
Parallel and Distributed Computing for Cybersecurity
IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Published by the IEEE Computer Society Vol. 6, No. 10; October 2005 Parallel and Distributed Computing for Cybersecurity Vipin Kumar, University of Minnesota
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Intrusion Detection & SNORT. Fakrul Alam [email protected]
Intrusion Detection & SNORT Fakrul Alam [email protected] Sometimes, Defenses Fail Our defenses aren t perfect Patches weren t applied promptly enough Antivirus signatures not up to date 0- days get through
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Association rules for improving website effectiveness: case analysis
Association rules for improving website effectiveness: case analysis Maja Dimitrijević, The Higher Technical School of Professional Studies, Novi Sad, Serbia, [email protected] Tanja Krunić, The
False Alert Reduction and Correlation for Attack Scenarios with Automatic Time Window
False Alert Reduction and Correlation for Attack Scenarios with Automatic Time Window M. Logaprakash Department of CSE (PG) Sri Ramakrishna Engineering College Coimbatore, India Abstract - The Intrusion
Extension of Decision Tree Algorithm for Stream Data Mining Using Real Data
Fifth International Workshop on Computational Intelligence & Applications IEEE SMC Hiroshima Chapter, Hiroshima University, Japan, November 10, 11 & 12, 2009 Extension of Decision Tree Algorithm for Stream
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM
MINING THE DATA FROM DISTRIBUTED DATABASE USING AN IMPROVED MINING ALGORITHM J. Arokia Renjit Asst. Professor/ CSE Department, Jeppiaar Engineering College, Chennai, TamilNadu,India 600119. Dr.K.L.Shunmuganathan
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
Keywords: Mobility Prediction, Location Prediction, Data Mining etc
Volume 4, Issue 4, April 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Data Mining Approach
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure William Yurcik* Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham University
Searching frequent itemsets by clustering data
Towards a parallel approach using MapReduce Maria Malek Hubert Kadima LARIS-EISTI Ave du Parc, 95011 Cergy-Pontoise, FRANCE [email protected], [email protected] 1 Introduction and Related Work
Network Forensics Analysis with Evidence Graphs (Demo Proposal)
Network Forensics Analysis with Evidence Graphs (Demo Proposal) Wei Wang and Thomas E. Daniels Department of Electrical and Computer Engineering Iowa State University Ames, Iowa 50010 Email: {weiwang,daniels}@iastate.edu
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Introduction to Data Mining
Introduction to Data Mining 1 Why Data Mining? Explosive Growth of Data Data collection and data availability Automated data collection tools, Internet, smartphones, Major sources of abundant data Business:
Using Artificial Intelligence in Intrusion Detection Systems
Using Artificial Intelligence in Intrusion Detection Systems Matti Manninen Helsinki University of Technology [email protected] Abstract Artificial Intelligence could make the use of Intrusion Detection
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
Comparing Methods to Identify Defect Reports in a Change Management Database
Comparing Methods to Identify Defect Reports in a Change Management Database Elaine J. Weyuker, Thomas J. Ostrand AT&T Labs - Research 180 Park Avenue Florham Park, NJ 07932 (weyuker,ostrand)@research.att.com
International Journal of World Research, Vol: I Issue XIII, December 2008, Print ISSN: 2347-937X DATA MINING TECHNIQUES AND STOCK MARKET
DATA MINING TECHNIQUES AND STOCK MARKET Mr. Rahul Thakkar, Lecturer and HOD, Naran Lala College of Professional & Applied Sciences, Navsari ABSTRACT Without trading in a stock market we can t understand
Dynamic Rule Based Traffic Analysis in NIDS
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 14 (2014), pp. 1429-1436 International Research Publications House http://www. irphouse.com Dynamic Rule Based
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
The Need for Intelligent Network Security: Adapting IPS for today s Threats
The Need for Intelligent Network Security: Adapting IPS for today s Threats James Tucker Security Engineer Sourcefire Nordics A Bit of History It started with passive IDS. Burglar alarm for the network
Data Mining: An Overview. David Madigan http://www.stat.columbia.edu/~madigan
Data Mining: An Overview David Madigan http://www.stat.columbia.edu/~madigan Overview Brief Introduction to Data Mining Data Mining Algorithms Specific Eamples Algorithms: Disease Clusters Algorithms:
Business Lead Generation for Online Real Estate Services: A Case Study
Business Lead Generation for Online Real Estate Services: A Case Study Md. Abdur Rahman, Xinghui Zhao, Maria Gabriella Mosquera, Qigang Gao and Vlado Keselj Faculty Of Computer Science Dalhousie University
Decision Trees from large Databases: SLIQ
Decision Trees from large Databases: SLIQ C4.5 often iterates over the training set How often? If the training set does not fit into main memory, swapping makes C4.5 unpractical! SLIQ: Sort the values
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management
Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree
Predicting the Risk of Heart Attacks using Neural Network and Decision Tree S.Florence 1, N.G.Bhuvaneswari Amma 2, G.Annapoorani 3, K.Malathi 4 PG Scholar, Indian Institute of Information Technology, Srirangam,
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Mining an Online Auctions Data Warehouse
Proceedings of MASPLAS'02 The Mid-Atlantic Student Workshop on Programming Languages and Systems Pace University, April 19, 2002 Mining an Online Auctions Data Warehouse David Ulmer Under the guidance
