A data mining framework for building intrusion detection models

被引:514
作者
Lee, W [1 ]
Stolfo, SJ [1 ]
Mok, KW [1 ]
机构
[1] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
来源
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY | 1999年
关键词
D O I
10.1109/SECPRI.1999.766909
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are constructed by manual encoding of expert knowledge, changes to IDSs are expensive and slow. In this paper we describe a data mining framework for adaptively building Intrusion Detection (ID) models. The central idea is to utilize auditing programs to extract an extensive set of features that describe each network connection or host session, and apply data mining programs to learn rules that accurately capture the behavior of intrusions and normal activities. These rules can then be used for misuse detection and anomaly detection. New detection models are incorporated into an existing IDS through a meta-learning (or co-operative learning) process, which produces a meta detection model that combines evidence from multiple models. We discuss the strengths of our data mining programs, namely, classification, meta-learning, association rules, and frequent episodes. We report our results of applying these programs to the extensively gathered network audit data for the 1998 DARPA Intrusion Detection Evaluation Program.
引用
收藏
页码:120 / 132
页数:13
相关论文
共 21 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
[Anonymous], [No title captured]
[3]  
[Anonymous], 1998, P 7 USENIX SEC S SAN
[4]  
Chan P. K., 1993, P AAAI WORKSH KNOWL, P227
[5]  
Cohen WW, 1995, MACHINE LEARNING
[6]   The KDD process for extracting useful knowledge from volumes of data [J].
Fayyad, U ;
PiatetskyShapiro, G ;
Smyth, P .
COMMUNICATIONS OF THE ACM, 1996, 39 (11) :27-34
[7]   STATE TRANSITION ANALYSIS - A RULE-BASED INTRUSION DETECTION APPROACH [J].
ILGUN, K ;
KEMMERER, RA ;
PORRAS, PA .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1995, 21 (03) :181-199
[8]  
Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313
[9]  
Kumar S., 1995, The 18th National Information Security Conference, P194
[10]  
Lane Terran., 1997, P AAAI 1997 WORKSHOP, P43