A sequential pattern mining algorithm for misuse intrusion detection

被引:0
|
作者
Song, SJ [1 ]
Huang, ZG [1 ]
Hu, HP [1 ]
Jin, SY [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a sequential pattern mining algorithm for misuse intrusion detection, which can be used to detect application layer attack. The algorithm can distinguish the order of attack behavior, and overcome the limitation of Wenke Lee's method, which performs statistical analysis against intrusion behavior at the network layer with frequent episode algorithm. The algorithm belongs to behavior analysis technique based on protocol analysis. The preprocessed data of the algorithm are application layer connection records extracted from DARPA's tcpdump data by protocol analysis tools. We use vertical item-transaction data structure in the algorithm. Compared with AprioriAll algorithm, the complexity of this algorithm is decreased greatly. Using this algorithm, we dig out an "intrusion-only" itemset sequential pattern, which is different from normal user command sequential pattern. Experiments indicate that our algorithm describes attacks more accurately, and it can detect those attacks whose features appear only once. Our presentation offers a new approach for the research of misuse intrusion detection.
引用
收藏
页码:458 / 465
页数:8
相关论文
共 50 条
  • [21] Application of Sequential Pattern Mining Algorithm in Commodity Management
    Wang, Xiaoli
    Wang, Fang
    Yan, Shi
    Liu, ZhanBo
    JOURNAL OF ELECTRONIC COMMERCE IN ORGANIZATIONS, 2018, 16 (03) : 94 - 106
  • [22] An Efficient Algorithm for Sequential Pattern Mining With Time Constraints
    Tao, Zaiping
    MATERIAL AND MANUFACTURING TECHNOLOGY II, PTS 1 AND 2, 2012, 341-342 : 530 - 534
  • [23] An efficient algorithm for mining condensed sequential pattern bases
    Wang, Tao
    KYBERNETES, 2012, 41 (09) : 1289 - 1296
  • [24] A Fuzzy Constrained Stream Sequential Pattern Mining Algorithm
    Shaken, Omid
    Pedram, Mir Mohsen
    Kelarestaghi, Manoochehr
    2014 7th International Symposium on Telecommunications (IST), 2014, : 20 - 24
  • [25] An Efficient Algorithm for High Utility Sequential Pattern Mining
    Wang, Jun-Zhe
    Yang, Zong-Hua
    Huang, Jiun-Long
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 49 - 56
  • [26] A closed sequential pattern mining algorithm in time order
    Fu, Yu
    Yu, Yan-Hua
    Song, Mei-Na
    Zhan, Xiao-Su
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2013, 36 (04): : 19 - 22
  • [27] Algorithm for Mining Sequential Pattern in Time Series Data
    Zhu, Chong
    Zhang, Xiangli
    Sun, Jingguo
    Huang, Bin
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 258 - 262
  • [28] The Sequential Pattern Mining Algorithm MHSP Based on MH
    Wang, Jun
    Jiang, Yaqiong
    ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 425 - +
  • [29] Sequential pattern mining algorithm for automotive warranty data
    Buddhakulsomsiri, Jirachai
    Zakarian, Armen
    COMPUTERS & INDUSTRIAL ENGINEERING, 2009, 57 (01) : 137 - 147
  • [30] On the Sequential Pattern Mining Algorithm Based on Projection position
    Li, Taoshen
    Wang, Weina
    Chen, Qingfeng
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 460 - 463