Frequent episode rules for Internet anomaly detection

被引:0
|
作者
Qin, M [1 ]
Hwang, K [1 ]
机构
[1] Univ So Calif, Los Angeles, CA 90089 USA
关键词
network security; intrusion detection; traffic datamining; anomaly detection; false alarms; grid computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces a new Internet trace technique for generating frequent episode rules to characterize Internet traffic events. These episode rules are used to distinguish anomalous sequences of TCP, UDP, or ICMP connections from normal traffic episodes. Fundamental pruning techniques are introduced to reduce the rule search space by 70%. The new detection scheme was tested over real-life Internet trace data at USC. Our anomaly detection scheme results in a success rate of 47% for DoS, R2L, and port-scanning attacks. These results demonstrate an average of 51% improvement over the use of association rules. We experienced 20 or less false alarms over 200 network attacks in 9 days of tracing experiments. This anomaly detection scheme can be used jointly with signature-based IDS to achieve even higher detection efficiency.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [1] INTERNET ANOMALY DETECTION WITH WEIGHTED FUZZY MATCHING OVER FREQUENT EPISODE RULES
    Chen, Da-Peng
    Zhang, Xiao-Song
    2008 INTERNATIONAL CONFERENCE ON APPERCEIVING COMPUTING AND INTELLIGENCE ANALYSIS (ICACIA 2008), 2008, : 299 - 302
  • [2] Web Anomaly Detection Based on Frequent Closed Episode Rules
    Wang, Lei
    Cao, Shoufeng
    Wan, Lin
    Wang, Fengyu
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 967 - 972
  • [3] Applying Frequent Episode Algorithm to Masquerade Detection
    Yu, Feng
    Wang, Min
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 495 - +
  • [4] Anomaly detection for Internet worms
    Al-Hammadi, Y
    Leckie, C
    Integrated Network Management IX: MANAGING NEW NETWORKED WORLDS, 2005, : 133 - 146
  • [5] Anomaly detection for internet surveillance
    Bouma, Henri
    Raaijmakers, Stephan
    Halma, Arvid
    Wedemeijer, Harry
    CYBER SENSING 2012, 2012, 8408
  • [6] Anomaly detection model of fuzzy episode patterns
    Peng, XG
    Zhang, X
    ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 1451 - 1454
  • [7] Anomaly detection based on fuzzy rules
    Jiao W.
    Li Q.
    International Journal of Performability Engineering, 2018, 14 (02) : 376 - 385
  • [8] Anomaly Detection for Internet of Things Cyberattacks
    Alanazi, Manal
    Aljuhani, Ahamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 261 - 279
  • [9] Internet routing anomaly detection and visualization
    Wong, T
    Jacobson, V
    Alaettinoglu, C
    2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2005, : 172 - 181
  • [10] Computer Log Anomaly Detection Using Frequent Episodes
    Halonen, Perttu
    Miettinen, Markus
    Hatonen, Kimmo
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS III, 2009, : 417 - 422