Data Mining for Network Intrusion Detection
|
|
|
- Susan Page
- 10 years ago
- Views:
Transcription
1 Data Mining for Network Intrusion Detection S Terry Brugger UC Davis Department of Computer Science Data Mining for Network Intrusion Detection p.1/55
2 Overview This is important for defense in depth Much work has been done in the area, but no solution yet I will investigate an ensemble approach as a possible solution Data Mining for Network Intrusion Detection p.2/55
3 We need to detect intrusions Can t stop intrusions, so need to mitigate them Can mitigate (stop the attackers) when they re detected, or take other corrective action (improving defenses) Part of defense in depth Data Mining for Network Intrusion Detection p.3/55
4 Current IDSs are not sufficient Only detect known attacks Can t detect insider attacks (privilege abuse) Don t have a holistic picture of the network to detect multi-step attacks over a long time period Data for detection is available, but sysadmin resources are limited Data Mining for Network Intrusion Detection p.4/55
5 The solution is Data Mining Data Mining: The process of extracting useful and previously unnoticed models or patterns from large data stores. (Also called sensemaking.) Data Mining for Network Intrusion Detection p.5/55
6 Data mining should be done in an Offline environment Last line of defense used in concert with real-time systems Allows system to be queried post hoc More complete session information Data mining techniques are expensive (even with mitigation through cost-based models [Lee]) Data Mining for Network Intrusion Detection p.6/55
7 More reasons to work in an Offline environment Periodic batch processing provides trade-off between timeliness and efficiency Allows for holistic picture, grouping related activity Harder to attack IDS via denial of service Data Mining for Network Intrusion Detection p.7/55
8 We mine network connection records Readily available Efficient (good size to information ratio) Easy for data mining methods to operate on Avoids privacy issues and encryption of data streams Data Mining for Network Intrusion Detection p.8/55
9 How network connection records break down Intrinsic attributes Essential attributes Axis and reference attributes Secondary attributes Calculated attributes Data Mining for Network Intrusion Detection p.9/55
10 Place-holder for intrinsic attributes table Data Mining for Network Intrusion Detection p.10/55
11 Place-holder for calculated attributes table Data Mining for Network Intrusion Detection p.11/55
12 Additional useful information Calendar schema Normalization (pseudo-bayes estimators, probability given other values) Compression (UDP, ICMP, source net, information gain) Selection using genetic algorithm [Helmer] Data Mining for Network Intrusion Detection p.12/55
13 Many datasets, none great Information Exploration Shootout (IES) Internet Traffic Archive [LBL] Security Suite 16 [InfoWorld] DARPA Off-line Intrusion Detection Evaluation 1998 KDD-Cup 1999 Data Mining for Network Intrusion Detection p.13/55
14 What s so bad with the IDEval? McHugh identified numerous procedural problems Unrealistic data rates Failure to show relation to real traffic Data Mining for Network Intrusion Detection p.14/55
15 More problems with IDEval? Mahoney & Chan found problems with the data Some fields like TTL predictable Allowed naive methods to achieve high detection rates Correctable by mixing with real traffic Despite all this, DARPA dataset still the standard Data Mining for Network Intrusion Detection p.15/55
16 Some desired features in existing systems Information Security Officer s Assistant (ISOA) [Winkler] and Distributed Intrusion Detection System (DIDS) [Snapp] did data fusion and multi-sensor correlation SRI work: IDES, NIDES, EMERALD provide more published research in this area Data Mining for Network Intrusion Detection p.16/55
17 Commercial offerings to correlate alarms RealSecure SiteProtector Symantec ManHunt nsecure npatrol Cisco IDS Network Flight Recorder (NFR) Data Mining for Network Intrusion Detection p.17/55
18 Commercial offerings for audit trail integrity Computer Associates etrust Intrusion Detection Log View NetSecure Log Data Mining for Network Intrusion Detection p.18/55
19 Some functionality offered by services SANS Internet Storm Center dshield (Independent Storm Center Analysis and Coordination Center) mynetwatchman Security Focus DeepSight Analyzer Managed service available from Counterpane, ISS, and Symantec Data Mining for Network Intrusion Detection p.19/55
20 Internet Storm Center Data Mining for Network Intrusion Detection p.20/55
21 Two major data mining approaches Statistical (top-down) Machine learning (bottom-up) Data Mining for Network Intrusion Detection p.21/55
22 Statistical techniques Probability of record given correlated probability of individual fields [SRI] Probability of record given Bayes network of conditional probabilities [Staniford] Probability of value not seen in training given alphabet size and time since last anomaly [Mahoney] Decision trees (ID3) [Sinclair] Data Mining for Network Intrusion Detection p.22/55
23 Many types of machine learning Classification Clustering Support Vector Machines [Eskin,Mukkamala] Others Data Mining for Network Intrusion Detection p.23/55
24 Classification approaches Inductive rule [Lee,Helmer,Warrender] Genetic algorithms [Neri,Sinclair,Dasgupta,Crosbie,Chittur] Fuzzy rules [Dickerson,Luo] Neural nets [Giacinto,Ghosh,Ryan,Endler] Immunological [Hofmeyr,Dasgupta,Fan] Data Mining for Network Intrusion Detection p.24/55
25 Clustering approaches Fixed width, k-nearest neighbor [Portnoy,Eskin,Chan] k-means [Bloedorn] Learning Vector Quantization [Marin] Simulated annealing [Staniford] Data Mining for Network Intrusion Detection p.25/55
26 More Clustering approaches Approximate Distance Clustering & AKMDE [Marchette] Dynamic Clustering [Sequeira] Parzen-window [Yeung] Instance-based learner [Lane] Data Mining for Network Intrusion Detection p.26/55
27 Other approaches Colored Petri nets [Kumar] Graphs [Staniford,Tolle] Markov models [Lane,Warrender] Data Mining for Network Intrusion Detection p.27/55
28 Other proposed methods Proposed by [Denning] [Denning] [Denning] [Denning] [Kumar] [Denning] [Frank,Endler] Method operational model mean and standard deviation multivariate model Markov process model generalized Markov chain time series model Recurrent neural network Data Mining for Network Intrusion Detection p.28/55
29 More proposed methods [Chan,Prodromidis] [Bass] [Bass] [Lane] [Lane] [Lane] [Lane] [Lane] C4.5, ID3, CART, WPEBLS Dempster-Shafer method Generalized EPT Spectral analysis Principle component analysis Linear regression Linear predictive coding (γ, ǫ)-similarity Data Mining for Network Intrusion Detection p.29/55
30 Research to date has provided progress, no solution Most data mining methods for ID are good at detecting particular types of malicious activity False positive rates are high (base-rate fallacy [Axelsson]) Data Mining for Network Intrusion Detection p.30/55
31 Better performance through Ensemble techniques (Also called meta-learning or multi-strategy learning) It is well known in the machine learning literature that appropriate combination of a number of weak classifiers can yield a highly accurate global classifier. [Lane] Data Mining for Network Intrusion Detection p.31/55
32 More support for Ensemble techniques Neri notes that combining classifiers learned by different learning methods, such as hill-climbing and genetic evolution, can produce higher classification performances because of the different knowledge captured by complementary search methods. Data Mining for Network Intrusion Detection p.32/55
33 Ensemble techniques important for ID In reality there are many different types of intrusions, and different detectors are needed to detect them. [Axelsson] Combining evidence from multiple base classifiers... is likely to improve the effectiveness in detecting intrusions. [Lee] Data Mining for Network Intrusion Detection p.33/55
34 Some work has been done with Ensemble techniques Manually built covariance matrix in [N]IDES to use multiple classifiers Crosbie s autonomous agents and Staniford s SPICE also do basic correlation of statistical classifiers Lee, Fan, et al. proposed use for incorporating classifiers trained on new data and aging out old classifiers Data Mining for Network Intrusion Detection p.34/55
35 More prior work with Ensemble techniques Lee, Fan, et al. also used cost-based meta-classifiers ADAM uses multiple classifiers for filtering [Barbará] Giacinto et al. use ensemble of neural nets trained on different feature sets Data Mining for Network Intrusion Detection p.35/55
36 Outstanding questions 1. For baseline purposes, what is the accuracy of a contemporary NID on the DARPA dataset? 2. Ideal number of states for a Hidden Markov Model, and what parameters influence this value? 3. Ideal feature sets for different data mining techniques? 4. Should connectionless protocols like UDP and ICMP, be compressed to a single connection (as in TCP)? 5. Separate training sets for classifiers and meta-classifiers? Data Mining for Network Intrusion Detection p.36/55
37 More Outstanding questions 6. What is the accuracy of ensemble based offline NID employing numerous, different, techniques? 7. How much data is required in order to properly train a data-mining based IDS? 8. How dependent is data mining performance on training on same network as it s used? 9. Should hosts and / or services be grouped together for usage profiles? Data Mining for Network Intrusion Detection p.37/55
38 More Outstanding questions 10. Other forms of data compression to improve accuracy? 11. Predictive capabilities of an offline network intrusion detection system? 12. How much will the incorporation additional data sources improve performance? 13. Better accuracy by considering state of hosts with connection as transition operator? 14. Does the ideal time window, w, depend on the current state of a host? Data Mining for Network Intrusion Detection p.38/55
39 Big questions 15. What similarities or differences exist in the traffic characteristics between different types of networks that impact the performance characteristics of a network intrusion detector? 16. What is the user acceptability level of false alarms? 17. How much can false alarms be reduced through the use of user feedback, and learning algorithms or classifier retraining? Data Mining for Network Intrusion Detection p.39/55
40 What am I going to do about it? Data Mining for Network Intrusion Detection p.40/55
41 Answer the first six 1. For baseline purposes, what is the accuracy of a contemporary NID on the DARPA dataset? 2. Ideal number of states for a Hidden Markov Model, and what parameters influence this value? 3. Ideal feature sets for different data mining techniques? Data Mining for Network Intrusion Detection p.41/55
42 Goal 4. Should connectionless protocols like UDP and ICMP, be compressed to a single connection (as in TCP)? 5. Separate training sets for classifiers and meta-classifiers? 6. What is the accuracy of ensemble based offline NID employing numerous, different, techniques? Data Mining for Network Intrusion Detection p.42/55
43 Approach Datasets 1998, 1999 DARPA TCP data 1998 DARPA mixed with real data Baseline Snort Connection Mining (tcpreduce) Data Mining for Network Intrusion Detection p.43/55
44 Place-holder for Connection Table Creation Data Mining for Network Intrusion Detection p.44/55
45 Place-holder for Results Table Creation Data Mining for Network Intrusion Detection p.45/55
46 Base method creation Training mode Classification mode Data Mining for Network Intrusion Detection p.46/55
47 Anomaly detection methods Bayes network Non-self bit-vectors Hidden Markov Model Data Mining for Network Intrusion Detection p.47/55
48 Classification methods Decision tree Associative rules Neural network Elman network Genetic algorithm Clustering algorithm Support Vector Machine Data Mining for Network Intrusion Detection p.48/55
49 Further approach Ideal parameter determination Ideal feature set determination Base classifier analysis Training information population Data Mining for Network Intrusion Detection p.49/55
50 About Meta-classifiers 1. Total anomaly from individual 2. Total probe from individual 3. Total DoS from individual 4. Total R2L from individual 5. Total U2L from individual 6. Total threat from individual 7. Total threat from totals Data Mining for Network Intrusion Detection p.50/55
51 Meta-classifiers Naive-Bayes Decision tree Associative rules Neural network Genetic algorithm Support Vector Machine Data Mining for Network Intrusion Detection p.51/55
52 Final approach Ideal meta-classifier training Ideal performance testing Analysis and writeup Data Mining for Network Intrusion Detection p.52/55
53 Timeline Step Finish date Mixed dataset generated 7 October 2004 Baseline 1 November 2004 Connection mining 15 October 2004 Table creation 15 August 2004 Base classifiers 1 April 2005 HMM parameter estimation 15 April 2005 Ideal feature set determination 1 July 2005 Data Mining for Network Intrusion Detection p.53/55
54 A little more time Base classifier analysis 15 August 2005 Training information population 1 September 2005 Meta-classifiers 22 October 2005 Ideal meta-classifier training 15 December 2005 Ideal performance testing 1 February 2006 Data Mining for Network Intrusion Detection p.54/55
55 Completion of dissertation 1 May 2006 Data Mining for Network Intrusion Detection p.55/55
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
How To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
Intrusion Detection. Jeffrey J.P. Tsai. Imperial College Press. A Machine Learning Approach. Zhenwei Yu. University of Illinois, Chicago, USA
SERIES IN ELECTRICAL AND COMPUTER ENGINEERING Intrusion Detection A Machine Learning Approach Zhenwei Yu University of Illinois, Chicago, USA Jeffrey J.P. Tsai Asia University, University of Illinois,
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Efficient Security Alert Management System
Efficient Security Alert Management System Minoo Deljavan Anvary IT Department School of e-learning Shiraz University Shiraz, Fars, Iran Majid Ghonji Feshki Department of Computer Science Qzvin Branch,
Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume1 Issue 3 Dec 2012 Page No. 151-155 Hybrid Model For Intrusion Detection System Chapke Prajkta P., Raut A. B.
Intrusion Detection Systems. Overview. Evolution of IDSs. Oussama El-Rawas. History and Concepts of IDSs
Intrusion Detection Systems Oussama El-Rawas History and Concepts of IDSs Overview A brief description about the history of Intrusion Detection Systems An introduction to Intrusion Detection Systems including:
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Hybrid Intrusion Detection System Model using Clustering, Classification and Decision Table
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 9, Issue 4 (Mar. - Apr. 2013), PP 103-107 Hybrid Intrusion Detection System Model using Clustering, Classification
A Review on Network Intrusion Detection System Using Open Source Snort
, pp.61-70 http://dx.doi.org/10.14257/ijdta.2016.9.4.05 A Review on Network Intrusion Detection System Using Open Source Snort Sakshi Sharma and Manish Dixit Department of CSE& IT MITS Gwalior, India [email protected],
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Development of a Network Intrusion Detection System
Development of a Network Intrusion Detection System (I): Agent-based Design (FLC1) (ii): Detection Algorithm (FLC2) Supervisor: Dr. Korris Chung Please visit my personal homepage www.comp.polyu.edu.hk/~cskchung/fyp04-05/
IDS / IPS. James E. Thiel S.W.A.T.
IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods
Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.
Our Security Ways we protect our valuables: By Edith Butler Fall 2008 Locks Security Alarm Video Surveillance, etc. History about IDS It began in 1980, with James Anderson's paper: History of IDS Cont
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
Network Intrusion Detection Systems
Network Intrusion Detection Systems False Positive Reduction Through Anomaly Detection Joint research by Emmanuele Zambon & Damiano Bolzoni 7/1/06 NIDS - False Positive reduction through Anomaly Detection
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks
Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders
MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT
MODERN INTRUSION DETECTION, DATA MINING, AND DEGREES OF ATTACK GUILT Steven Noel Center for Secure Information Systems George Mason University, Fairfax VA 22030-4444, USA [email protected] Duminda Wijesekera
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack
The Integration of SNORT with K-Means Clustering Algorithm to Detect New Attack Asnita Hashim, University of Technology MARA, Malaysia April 14-15, 2011 The Integration of SNORT with K-Means Clustering
A Survey of Intrusion Detection System Using Different Data Mining Techniques
A Survey of Intrusion Detection System Using Different Data Mining Techniques Trupti Phutane, Apashabi Pathan Dept. of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL
NETWORK INTRUSION DETECTION SYSTEM USING HYBRID CLASSIFICATION MODEL Prof. Santosh T. Waghmode 1, Prof. Vinod S. Wadne 2 Department of Computer Engineering, 1, 2 JSPM s Imperial College of Engineering
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
A Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique
A new Approach for Intrusion Detection in Computer Networks Using Data Mining Technique Aida Parbaleh 1, Dr. Heirsh Soltanpanah 2* 1 Department of Computer Engineering, Islamic Azad University, Sanandaj
International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163 Volume 1 Issue 11 (November 2014)
Denial-of-Service Attack Detection Mangesh D. Salunke * Prof. Ruhi Kabra G.H.Raisoni CEM, SPPU, Ahmednagar HOD, G.H.Raisoni CEM, SPPU,Ahmednagar Abstract: A DoS (Denial of Service) attack as name indicates
Intrusion Detection Systems and Supporting Tools. Ian Welch NWEN 405 Week 12
Intrusion Detection Systems and Supporting Tools Ian Welch NWEN 405 Week 12 IDS CONCEPTS Firewalls. Intrusion detection systems. Anderson publishes paper outlining security problems 1972 DNS created 1984
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
Random forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation
An Efficient Way of Denial of Service Attack Detection Based on Triangle Map Generation Shanofer. S Master of Engineering, Department of Computer Science and Engineering, Veerammal Engineering College,
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm
Intrusion Detection System for Cloud Network Using FC-ANN Algorithm Swati Ramteke 1, Rajesh Dongare 2, Komal Ramteke 3 Student, Department of Information Technology, VIIT, Pune, India 1 Student, Department
ANALYTICS IN BIG DATA ERA
ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut
TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13
COURSE TITLE : INFORMATION SECURITY COURSE CODE : 5136 COURSE CATEGORY : ELECTIVE PERIODS/WEEK : 4 PERIODS/SEMESTER : 52 CREDITS : 4 TIME SCHEDULE MODULE TOPICS PERIODS 1 Introduction to Computer Security
An Introduction to Data Mining
An Introduction to Intel Beijing [email protected] January 17, 2014 Outline 1 DW Overview What is Notable Application of Conference, Software and Applications Major Process in 2 Major Tasks in Detail
IDS Categories. Sensor Types Host-based (HIDS) sensors collect data from hosts for
Intrusion Detection Intrusion Detection Security Intrusion: a security event, or a combination of multiple security events, that constitutes a security incident in which an intruder gains, or attempts
False Positives Reduction Techniques in Intrusion Detection Systems-A Review
128 False Positives Reduction Techniques in Intrusion Detection Systems-A Review Asieh Mokarian, Ahmad Faraahi, Arash Ghorbannia Delavar, Payame Noor University, Tehran, IRAN Summary During the last decade
Data Mining For Intrusion Detection Systems. Monique Wooten. Professor Robila
Data Mining For Intrusion Detection Systems Monique Wooten Professor Robila December 15, 2008 Wooten 2 ABSTRACT The paper discusses the use of data mining techniques applied to intrusion detection systems.
Intrusion Detection and Intrusion Prevention. Ed Sale VP of Security Pivot Group, LLC
Intrusion Detection and Intrusion Prevention Ed Sale VP of Security Pivot Group, LLC Presentation Goals Describe IDS and IPS Why They Are Important Deployment and Use Major Players The IT Security Camera
Prerequisites. Course Outline
MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier
A Study Of Bagging And Boosting Approaches To Develop Meta-Classifier G.T. Prasanna Kumari Associate Professor, Dept of Computer Science and Engineering, Gokula Krishna College of Engg, Sullurpet-524121,
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
IDS IN TELECOMMUNICATION NETWORK USING PCA
IDS IN TELECOMMUNICATION NETWORK USING PCA Mohamed Faisal Elrawy 1, T. K. Abdelhamid 2 and A. M. Mohamed 3 1 Faculty of engineering, MUST University, 6th Of October, Egypt [email protected] 2,3
A Practical Approach to Anomaly based Intrusion Detection System by Outlier Mining in Network Traffic
A Practical Approach to Anomaly based Intrusion Detection System by Outlier Mining in Network Traffic By Prajowal Manandhar A Thesis Presented to the Masdar Institute of Science and Technology in Partial
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)
1 of 8 3/25/2005 9:45 AM Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS) Intrusion Detection systems fall into two broad categories and a single new one. All categories
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK
HYBRID INTRUSION DETECTION FOR CLUSTER BASED WIRELESS SENSOR NETWORK 1 K.RANJITH SINGH 1 Dept. of Computer Science, Periyar University, TamilNadu, India 2 T.HEMA 2 Dept. of Computer Science, Periyar University,
Network Security A Decision and Game-Theoretic Approach
Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA
Mahalanobis Distance Map Approach for Anomaly Detection
Edith Cowan University Research Online Australian Information Security Management Conference Security Research Institute Conferences 2010 Mahalanobis Distance Map Approach for Anomaly Detection Aruna Jamdagnil
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Network Intrusion Detection Using a HNB Binary Classifier
2015 17th UKSIM-AMSS International Conference on Modelling and Simulation Network Intrusion Detection Using a HNB Binary Classifier Levent Koc and Alan D. Carswell Center for Security Studies, University
System for Denial-of-Service Attack Detection Based On Triangle Area Generation
System for Denial-of-Service Attack Detection Based On Triangle Area Generation 1, Heena Salim Shaikh, 2 N Pratik Pramod Shinde, 3 Prathamesh Ravindra Patil, 4 Parag Ramesh Kadam 1, 2, 3, 4 Student 1,
Observation and Findings
Chapter 6 Observation and Findings 6.1. Introduction This chapter discuss in detail about observation and findings based on survey performed. This research work is carried out in order to find out network
A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS
Journal homepage: www.mjret.in ISSN:2348-6953 A SYSTEM FOR DENIAL OF SERVICE ATTACK DETECTION BASED ON MULTIVARIATE CORRELATION ANALYSIS P.V.Sawant 1, M.P.Sable 2, P.V.Kore 3, S.R.Bhosale 4 Department
A Technical Review on Intrusion Detection System
A Technical Review on Intrusion Detection System Sejal K. Patel Umang H. Mehta Urmi M. Patel Dhruv H. Bhagat Pratik Nayak Teaching Assistant at department of computer science and technology Ankita D. Patel
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework
An analysis of suitable parameters for efficiently applying K-means clustering to large TCPdump data set using Hadoop framework Jakrarin Therdphapiyanak Dept. of Computer Engineering Chulalongkorn University
Passive Logging. Intrusion Detection System (IDS): Software that automates this process
Passive Logging Intrusion Detection: Monitor events, analyze for signs of incidents Look for violations or imminent violations of security policies accepted use policies standard security practices Intrusion
Role of Anomaly IDS in Network
Role of Anomaly IDS in Network SumathyMurugan 1, Dr.M.Sundara Rajan 2 1 Asst. Prof, Department of Computer Science, Thiruthangal Nadar College, Chennai -51. 2 Asst. Prof, Department of Computer Science,
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model
Application of Data Mining to Network Intrusion Detection: Classifier Selection Model Huy Anh Nguyen and Deokjai Choi Chonnam National University, Computer Science Department, 300 Yongbong-dong, Buk-ku,
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach
VHDL Modeling of Intrusion Detection & Prevention System (IDPS) A Neural Network Approach Tanusree Chatterjee Department of Computer Science Regent Education and Research Foundation Abstract- The rapid
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Intrusion Detection via Machine Learning for SCADA System Protection
Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. [email protected] J. Jiang Department
Credit Card Fraud Detection Using Hidden Markov Model
International Journal of Soft Computing and Engineering (IJSCE) Credit Card Fraud Detection Using Hidden Markov Model SHAILESH S. DHOK Abstract The most accepted payment mode is credit card for both online
Conclusions and Future Directions
Chapter 9 This chapter summarizes the thesis with discussion of (a) the findings and the contributions to the state-of-the-art in the disciplines covered by this work, and (b) future work, those directions
How to Detect and Prevent Cyber Attacks
Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division
Network packet payload analysis for intrusion detection
Network packet payload analysis for intrusion detection Sasa Mrdovic Abstract This paper explores possibility of detecting intrusions into computer networks using network packet payload analysis. Quick
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
Is a Data Scientist the New Quant? Stuart Kozola MathWorks
Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
A Review on Hybrid Intrusion Detection System using TAN & SVM
A Review on Hybrid Intrusion Detection System using TAN & SVM Sumalatha Potteti 1, Namita Parati 2 1 Assistant Professor, Department of CSE,BRECW,Hyderabad,India 2 Assistant Professor, Department of CSE,BRECW,Hyderabad,India
CS 5410 - Computer and Network Security: Intrusion Detection
CS 5410 - Computer and Network Security: Intrusion Detection Professor Kevin Butler Fall 2015 Locked Down You re using all the techniques we will talk about over the course of the semester: Strong access
Welcome. Data Mining: Updates in Technologies. Xindong Wu. Colorado School of Mines Golden, Colorado 80401, USA
Welcome Xindong Wu Data Mining: Updates in Technologies Dept of Math and Computer Science Colorado School of Mines Golden, Colorado 80401, USA Email: xwu@ mines.edu Home Page: http://kais.mines.edu/~xwu/
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks
Detection of Distributed Denial of Service Attacks Using Statistical Pre-Processor and Unsupervised Neural Networks Rasool Jalili 1, Fatemeh Imani-Mehr 1, Morteza Amini 1, Hamid Reza Shahriari 1 Department
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
HMM Profiles for Network Traffic Classification
HMM Profiles for Network Traffic Classification Charles Wright, Fabian Monrose and Gerald Masson Johns Hopkins University Information Security Institute Baltimore, MD 21218 Overview Problem Description
Data Mining. Nonlinear Classification
Data Mining Unit # 6 Sajjad Haider Fall 2014 1 Nonlinear Classification Classes may not be separable by a linear boundary Suppose we randomly generate a data set as follows: X has range between 0 to 15
How to use Big Data in Industry 4.0 implementations. LAURI ILISON, PhD Head of Big Data and Machine Learning
How to use Big Data in Industry 4.0 implementations LAURI ILISON, PhD Head of Big Data and Machine Learning Big Data definition? Big Data is about structured vs unstructured data Big Data is about Volume
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION
FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION Susan M. Bridges [email protected] Rayford B. Vaughn [email protected] 23 rd National Information Systems Security Conference
