Cyber intrusion detection through association rule mining on multi-source logs

被引:19
|
作者
Lou, Ping [1 ,2 ]
Lu, Guantong [1 ,2 ]
Jiang, Xuemei [1 ,2 ]
Xiao, Zheng [1 ,2 ]
Hu, Jiwei [1 ,2 ]
Yan, Junwei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Hubei Key Lab Broadband Wireless Commun & Sensor, Wuhan 430070, Hubei, Peoples R China
关键词
Security logs; Association rules; Data mining; Cyber intrusion; PREDICTION; EVENT;
D O I
10.1007/s10489-020-02007-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs, and system logs provide historical information describing potential security risks. However, the use of logs for cyber intrusion detection relies heavily on expert knowledge. It is very difficult for the non-expert to identify these intrusion behaviors. This paper proposes a new method for mining association rules from multi-source logs to detect various intrusion behaviors in the cloud computing platform. In this method, a rule base is constructed to detect cyber intrusion. An adaptive approach is used to speed up the calculation of the association rule mining, in which the decision depends on the time complexity of the algorithm. Various cyber-attacks are simulated in the verification experiments which show the calculation speed of the proposed method is faster than other algorithms. Furthermore, compared with other methods, the performance of the proposed intrusion detection method is better than others in term of precision, recall, and f-measure.
引用
收藏
页码:4043 / 4057
页数:15
相关论文
共 50 条
  • [21] Integrating association rule mining and decision tree learning for network intrusion detection: A preliminary investigation
    Hossain, M
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XI, PROCEEDINGS: COMPUTER SCIENCE II, 2002, : 65 - 70
  • [22] Network Intrusion Detection Using Class Association Rule Mining Based on Genetic Network Programming
    Chen, Ci
    Mabu, Shingo
    Shimada, Kaoru
    Hirasawa, Kotaro
    IEEJ TRANSACTIONS ON ELECTRICAL AND ELECTRONIC ENGINEERING, 2010, 5 (05) : 553 - 559
  • [23] Multi-Task Learning for Intrusion Detection on web logs
    Li, Bo
    Lin, Ying
    Zhang, Simin
    JOURNAL OF SYSTEMS ARCHITECTURE, 2017, 81 : 92 - 100
  • [24] Big-Data Analysis of Multi-Source Logs for Anomaly Detection on Network-based System
    Jia Zhanpei
    Shen Chao
    Yi Xiao
    Chen Yufei
    Yu Tianwen
    Guan Xiaohong
    2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 1136 - 1141
  • [25] Rule-Mining for the Early Prediction of Chronic Kidney Disease Based on Metabolomics and Multi-Source Data
    Luck, Margaux
    Bertho, Gildas
    Bateson, Mathilde
    Karras, Alexandre
    Yartseva, Anastasia
    Thervet, Eric
    Damon, Cecilia
    Pallet, Nicolas
    PLOS ONE, 2016, 11 (11):
  • [26] Multi-source Manifold Outlier Detection
    Zhang, Lei
    Wang, Shupeng
    Fu, Ge
    Wang, Zhenyu
    Cui, Lei
    Hou, Junteng
    COMPUTATIONAL SCIENCE - ICCS 2019, PT II, 2019, 11537 : 44 - 58
  • [27] Multi-source evidence fusion for cyber-situation assessment
    Sabata, Bikash
    Ornes, Chester
    MULTISENSOR, MULTISOURCE INFORMATIN FUSION: ARCHITECTURES, ALGORITHMS, AND APPLICATIONS 2006, 2006, 6242
  • [28] Multi Relational Mining in Network Intrusion Detection
    Zhang Youdong
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 4, PROCEEDINGS, 2008, : 445 - 448
  • [29] Multi-Source Feature Fusion for Object Detection Association in Connected Vehicle Environments
    Thornton, Samuel
    Flowers, Bryse
    Dey, Sujit
    IEEE ACCESS, 2022, 10 : 131841 - 131854
  • [30] Use of rule base data mining algorithm for Intrusion Detection
    Elekar, Kailas
    Waghmare, M. M.
    Priyadarshi, Amrit
    2015 INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING (ICPC), 2015,