Frequent episode rules for Internet anomaly detection

被引:0
|
作者
Qin, M [1 ]
Hwang, K [1 ]
机构
[1] Univ So Calif, Los Angeles, CA 90089 USA
关键词
network security; intrusion detection; traffic datamining; anomaly detection; false alarms; grid computing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces a new Internet trace technique for generating frequent episode rules to characterize Internet traffic events. These episode rules are used to distinguish anomalous sequences of TCP, UDP, or ICMP connections from normal traffic episodes. Fundamental pruning techniques are introduced to reduce the rule search space by 70%. The new detection scheme was tested over real-life Internet trace data at USC. Our anomaly detection scheme results in a success rate of 47% for DoS, R2L, and port-scanning attacks. These results demonstrate an average of 51% improvement over the use of association rules. We experienced 20 or less false alarms over 200 network attacks in 9 days of tracing experiments. This anomaly detection scheme can be used jointly with signature-based IDS to achieve even higher detection efficiency.
引用
收藏
页码:161 / 168
页数:8
相关论文
共 50 条
  • [41] Intrusion detection systems for the internet of things: a probabilistic anomaly detection approach
    Bali, Nadia
    Jaoua, Zied
    Bzeouich, Olfa
    Abbassi, Imed
    International Journal of Computers and Applications, 2024, 46 (11) : 933 - 944
  • [42] Network Anomaly Detection Approach Based on Frequent Pattern Mining Technique
    Dominic, Dhanapal Durai
    Said, Aiman Moyaid
    2014 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND TECHNOLOGY (ICCST), 2014,
  • [43] NEW ADAPTIVE NETWORK ANOMALY DETECTION SYSTEM USING FREQUENT PATTERNS
    Said, Aiman Moyaid
    Dominic, Dhanapal Durai
    Samir, Brahim Belhaouari
    Balfagih, Zain
    4TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2012), 2012, : 369 - 374
  • [44] Frequent Pattern based User Behavior Anomaly Detection for Cloud System
    Chiu, Chien-Yi
    Yeh, Chi-Tien
    Lee, Yuh-Jye
    2013 CONFERENCE ON TECHNOLOGIES AND APPLICATIONS OF ARTIFICIAL INTELLIGENCE (TAAI), 2013, : 61 - 66
  • [45] Online Frequent Episode Mining
    Ao, Xiang
    Luo, Ping
    Li, Chengkai
    Zhuang, Fuzhen
    He, Qing
    2015 IEEE 31ST INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE), 2015, : 891 - 902
  • [46] An Improved Anomaly Detection Method Based on Fuzzy Association Rules
    Yang, Zifen
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 474 - 477
  • [47] Automatic Classification Rules for Anomaly Detection in Time-Series
    Ben Kraiem, Ines
    Ghozzi, Faiza
    Peninou, Andre
    Roman-Jimenez, Geoffrey
    Teste, Olivier
    RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS 2020), 2020, 385 : 321 - 337
  • [48] Data relative currency repair and anomaly detection based on rules
    Duan, Xuliang
    Xiao, Zeyan
    Liu, Yuhai
    Li, Zhiyao
    Zhu, Qingsong
    Lang, Songsong
    EXPERT SYSTEMS WITH APPLICATIONS, 2024, 243
  • [49] A Method of Route Leak Anomaly Detection Based on Heuristic Rules
    Liu, Jingwei
    Yang, Bin
    Liu, Jinju
    Lug, Yuliang
    Zhu, Kailong
    PROCEEDINGS OF THE ADVANCES IN MATERIALS, MACHINERY, ELECTRICAL ENGINEERING (AMMEE 2017), 2017, 114 : 662 - 666
  • [50] Anomaly detection using invariant rules in Industrial Control Systems
    Zhu, Qilin
    Ding, Yulong
    Jiang, Jie
    Yang, Shuang-Hua
    CONTROL ENGINEERING PRACTICE, 2025, 154