A sequential pattern mining algorithm for misuse intrusion detection

被引:0
|
作者
Song, SJ [1 ]
Huang, ZG [1 ]
Hu, HP [1 ]
Jin, SY [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp Sci, Changsha, Peoples R China
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a sequential pattern mining algorithm for misuse intrusion detection, which can be used to detect application layer attack. The algorithm can distinguish the order of attack behavior, and overcome the limitation of Wenke Lee's method, which performs statistical analysis against intrusion behavior at the network layer with frequent episode algorithm. The algorithm belongs to behavior analysis technique based on protocol analysis. The preprocessed data of the algorithm are application layer connection records extracted from DARPA's tcpdump data by protocol analysis tools. We use vertical item-transaction data structure in the algorithm. Compared with AprioriAll algorithm, the complexity of this algorithm is decreased greatly. Using this algorithm, we dig out an "intrusion-only" itemset sequential pattern, which is different from normal user command sequential pattern. Experiments indicate that our algorithm describes attacks more accurately, and it can detect those attacks whose features appear only once. Our presentation offers a new approach for the research of misuse intrusion detection.
引用
收藏
页码:458 / 465
页数:8
相关论文
共 50 条
  • [41] An Efficient Pattern Matching Algorithm for Intrusion Detection Systems
    Anithakumari, S.
    Chithraprasad, D.
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 223 - +
  • [42] An Improved Pattern Matching Algorithm in the Intrusion Detection System
    Zhang Ping
    Liu Jianghui
    MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION, PTS 1 AND 2, 2011, 48-49 : 203 - +
  • [43] Fast interactive sequential pattern mining algorithm based on PrefixSpan
    Lu, Jieping
    Liu, Yuebo
    Ni, Weiwei
    Liu, Tongming
    Sun, Zhihui
    Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2005, 35 (05): : 692 - 696
  • [44] Projection position-based sequential pattern mining algorithm
    Wang, Weina
    Li, Taoshen
    Chen, Qingfeng
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2012, 40 (SUPPL.1): : 104 - 107
  • [45] Alarms Association Rules Based on Sequential Pattern Mining Algorithm
    Hou Sizu
    Zhang Xianfei
    FIFTH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, VOL 2, PROCEEDINGS, 2008, : 556 - 560
  • [46] Location-Based Parallel Sequential Pattern Mining Algorithm
    Kim, Byoungwook
    Yi, Gangman
    IEEE ACCESS, 2019, 7 : 128651 - 128658
  • [47] Closed Sequential Pattern Mining Algorithm Based Positional Data
    Zhu Zhenxin
    Lu Jiaguo
    ADVANCED TECHNOLOGY IN TEACHING - PROCEEDINGS OF THE 2009 3RD INTERNATIONAL CONFERENCE ON TEACHING AND COMPUTATIONAL SCIENCE (WTCS 2009), VOL 1: INTELLIGENT UBIQUITIOUS COMPUTING AND EDUCATION, 2012, 116 : 45 - +
  • [48] A multi-supports-based sequential pattern mining algorithm
    Xiong, Y
    Zhu, YY
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 170 - 174
  • [49] A Novel Approach for Sequential Pattern Mining By Using Genetic Algorithm
    Saravanan, M.
    Jyothi, V. L.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 284 - 288
  • [50] A sequential pattern mining algorithm using rough set theory
    Kaneiw, Ken
    Kudo, Yasuo
    INTERNATIONAL JOURNAL OF APPROXIMATE REASONING, 2011, 52 (06) : 881 - 893