Adaptive intrusion detection: A data mining approach

被引:181
作者
Lee, WK [1 ]
Stolfo, SJ
Mok, KW
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] Columbia Univ, Dept Comp Sci, New York, NY 10027 USA
[3] Morgan Stanley Dean Witter & Co, New York, NY 10019 USA
基金
美国国家科学基金会;
关键词
association rules; audit data; classification; feature construction; frequent episodes; intrusion detection;
D O I
10.1023/A:1006624031083
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Tn this paper we describe a data mining framework for constructing intrusion detection models. The first key idea is to mine system audit data for consistent: and useful patterns of program and user behavior The other is to use the set of relevant system features presented in the patterns to compute inductively learned classifiers that can recognize anomalies and known intrusions. In order for the classifiers to be effective intrusion detection models, we need to have sufficient audit data for training and also select a set of predictive system features. We propose to use the association rules and frequent episodes computed from audit data as the basis for guiding the audit data gathering and feature selection processes. We modify these two basic algorithms to use axis attribute(s) and reference attribute(s) as forms of item constraints to compute only the relevant patterns. In addition, we use an iterative level-wise approximate mining procedure to uncover the low frequency but important patterns. We use meta-learning as a mechanism to make intrusion detection models more effective and adaptive. We report our extensive experiments in using our framework on real-world audit data.
引用
收藏
页码:533 / 567
页数:35
相关论文
共 27 条
[1]  
Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
[2]  
AGRAWAL R, 1995, P 11 INT C DAT ENG T
[3]  
[Anonymous], PROC
[4]  
[Anonymous], 1998, P 7 USENIX SEC S SAN
[5]  
Bellovin S. M., 1989, Computer Communication Review, V19, P32, DOI 10.1145/378444.378449
[6]  
Chan P. K., 1993, P AAAI WORKSH KNOWL, P227
[7]  
COHEN WW, 1995, MACH LEARNING
[8]   Adaptive fraud detection [J].
Fawcett, T ;
Provost, F .
DATA MINING AND KNOWLEDGE DISCOVERY, 1997, 1 (03) :291-316
[9]   A sense of self for unix processes [J].
Forrest, S ;
Hofmeyr, SA ;
Somayaji, A ;
Longstaff, TA .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :120-128
[10]   UNIX OPERATING SYSTEM SECURITY [J].
GRAMPP, FT ;
MORRIS, RH .
AT&T BELL LABORATORIES TECHNICAL JOURNAL, 1984, 63 (08) :1649-1672