Cyber intrusion detection through association rule mining on multi-source logs

被引:19
|
作者
Lou, Ping [1 ,2 ]
Lu, Guantong [1 ,2 ]
Jiang, Xuemei [1 ,2 ]
Xiao, Zheng [1 ,2 ]
Hu, Jiwei [1 ,2 ]
Yan, Junwei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Hubei Key Lab Broadband Wireless Commun & Sensor, Wuhan 430070, Hubei, Peoples R China
关键词
Security logs; Association rules; Data mining; Cyber intrusion; PREDICTION; EVENT;
D O I
10.1007/s10489-020-02007-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs, and system logs provide historical information describing potential security risks. However, the use of logs for cyber intrusion detection relies heavily on expert knowledge. It is very difficult for the non-expert to identify these intrusion behaviors. This paper proposes a new method for mining association rules from multi-source logs to detect various intrusion behaviors in the cloud computing platform. In this method, a rule base is constructed to detect cyber intrusion. An adaptive approach is used to speed up the calculation of the association rule mining, in which the decision depends on the time complexity of the algorithm. Various cyber-attacks are simulated in the verification experiments which show the calculation speed of the proposed method is faster than other algorithms. Furthermore, compared with other methods, the performance of the proposed intrusion detection method is better than others in term of precision, recall, and f-measure.
引用
收藏
页码:4043 / 4057
页数:15
相关论文
共 50 条
  • [1] Cyber intrusion detection through association rule mining on multi-source logs
    Ping Lou
    Guantong Lu
    Xuemei Jiang
    Zheng Xiao
    Jiwei Hu
    Junwei Yan
    Applied Intelligence, 2021, 51 : 4043 - 4057
  • [2] Association rule mining in intrusion detection systems
    Zhao, D
    Lu, YS
    APOC 2003: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK ARCHITECTURES, MANAGEMENT, AND APPLICATIONS, PTS 1 AND 2, 2003, 5282 : 577 - 581
  • [3] CloudFusion: Multi-Source Intrusion Detection in Cloud Environments
    Xu, Yang
    Zhang, Kun
    Xia, Hao Jun
    Tu, Bibo
    Li, Chen
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2656 - 2661
  • [4] Anomalous User Activity Detection in Enterprise Multi-Source Logs
    Hu, Qiaona
    Tang, Baoming
    Lin, Derek
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 797 - 803
  • [5] A framework for the application of association rule mining in large intrusion detection infrastructures
    Treinen, James J.
    Thurimella, Ramakrishna
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 1 - 18
  • [6] Intrusion detection system based on new association rule mining model
    Li, TR
    Pan, WM
    2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 512 - 515
  • [7] MIND: A Multi-Source Data Fusion Scheme for Intrusion Detection in Networks
    Anjum, Naveed
    Latif, Zohaib
    Lee, Choonhwa
    Shoukat, Ijaz Ali
    Iqbal, Umer
    SENSORS, 2021, 21 (14)
  • [8] Multi-Source Cyber-Attacks Detection using Machine Learning
    Taheri, Sona
    Gondal, Iqbal
    Bagirov, Adil
    Harkness, Greg
    Brown, Simon
    Chi, CHihung
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1167 - 1172
  • [9] Multi-Source Uncertainty Mining for Deep Unsupervised Saliency Detection
    Wang, Yifan
    Zhang, Wenbo
    Wang, Lijun
    Liu, Ting
    Lu, Huchuan
    2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR), 2022, : 11717 - 11726
  • [10] Association Rule Mining Frequent-Pattern-Based Intrusion Detection in Network
    Sivanantham, S.
    Mohanraj, V
    Suresh, Y.
    Senthilkumar, J.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2023, 44 (02): : 1617 - 1631