Cyber intrusion detection through association rule mining on multi-source logs

被引:19
|
作者
Lou, Ping [1 ,2 ]
Lu, Guantong [1 ,2 ]
Jiang, Xuemei [1 ,2 ]
Xiao, Zheng [1 ,2 ]
Hu, Jiwei [1 ,2 ]
Yan, Junwei [1 ,2 ]
机构
[1] Wuhan Univ Technol, Sch Informat Engn, Wuhan 430070, Hubei, Peoples R China
[2] Wuhan Univ Technol, Hubei Key Lab Broadband Wireless Commun & Sensor, Wuhan 430070, Hubei, Peoples R China
关键词
Security logs; Association rules; Data mining; Cyber intrusion; PREDICTION; EVENT;
D O I
10.1007/s10489-020-02007-5
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Security logs in cloud environment like intrusion detection system (IDS) logs, firewall logs, and system logs provide historical information describing potential security risks. However, the use of logs for cyber intrusion detection relies heavily on expert knowledge. It is very difficult for the non-expert to identify these intrusion behaviors. This paper proposes a new method for mining association rules from multi-source logs to detect various intrusion behaviors in the cloud computing platform. In this method, a rule base is constructed to detect cyber intrusion. An adaptive approach is used to speed up the calculation of the association rule mining, in which the decision depends on the time complexity of the algorithm. Various cyber-attacks are simulated in the verification experiments which show the calculation speed of the proposed method is faster than other algorithms. Furthermore, compared with other methods, the performance of the proposed intrusion detection method is better than others in term of precision, recall, and f-measure.
引用
收藏
页码:4043 / 4057
页数:15
相关论文
共 50 条
  • [31] Inferring, Summarizing and Mining Multi-source Graph Data
    Koutra, Danai
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW 2017), 2017, : 978 - 978
  • [32] The Intrusion Detection System Based on a Novel Association Rule
    Gu, Baoping
    Guo, Honyan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1312 - 1315
  • [33] Improved intrusion detection method for communication networks using association rule mining and artificial neural networks
    Safara, Fatemeh
    Souri, Alireza
    Serrizadeh, Masoud
    IET COMMUNICATIONS, 2020, 14 (07) : 1192 - 1197
  • [34] Network Intrusion Detection using Fuzzy Class Association Rule Mining Based on Genetic Network Programming
    Chen, Ci
    Mabu, Shingo
    Yue, Chuan
    Shimada, Kaoru
    Hirasawa, Kotaro
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 60 - 67
  • [35] Detecting stepping-stone intrusion using association rule mining
    Hsiao, Han-Wei
    Sun, Huey-Min
    Fan, Wei-Cheng
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1225 - 1235
  • [36] Multi-source data based anomaly detection through temporal and spatial characteristics
    Xu, Peng
    Gao, Qihong
    Zhang, Zhongbao
    Zhao, Kai
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 237
  • [37] Insider Threat Identification Using the Simultaneous Neural Learning of Multi-Source Logs
    Liu, Liu
    Chen, Chao
    Zhang, Jun
    De Vel, Olivier
    Xiang, Yang
    IEEE ACCESS, 2019, 7 : 183162 - 183176
  • [38] Multi-source Anomaly Detection in Distributed IT Systems
    Bogatinovski, Jasmin
    Nedelkoski, Sasho
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 201 - 213
  • [39] Multi-source Information Fusion for Depression Detection
    Wang, Rongquan
    Wang, Huiwei
    Hu, Yan
    Wei, Lin
    Ma, Huimin
    PATTERN RECOGNITION AND COMPUTER VISION, PRCV 2023, PT V, 2024, 14429 : 517 - 528
  • [40] Multi-source weak supervision for saliency detection
    Zeng, Yu
    Zhuge, Yunzhi
    Lu, Huchuan
    Zhang, Lihe
    Qian, Mingyang
    Yu, Yizhou
    2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 6067 - 6076