Skip to main content

Part of the book series: Advances in Information Security ((ADIS,volume 31))

Abstract

This chapter provides an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security. The various components of MINDS such as the scan detector, anomaly detector and the profiling module detect different types of attacks and intrusions on a computer network. The scan detector aims at detecting scans which are the percusors to any network attack. The anomaly detection algorithm is very effective in detecting behavioral anomalies in the network traffic which typically translate to malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. The profiling module helps a network analyst to understand the characteristics of the network traffic and detect any deviations from the normal profile. Our analysis shows that the intrusions detected by HINDS are complementary to those of traditional signature based systems, such as SNORT, which implies that they both can be combined to increase overall attack coverage. MINDS has shown great operational success in detecting network intrusions in two live deployments at the University of Minnesota and as a part of the Interrogator architecture at the US Army Research Lab — Center for Intrusion Monitoring and Protection (ARL-CIMP).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rakesh Agrawal, Tomasz Imieliski, and Arun Swami. Mining association rules between sets of items in large databases. In Proceedings of the 1993 ACM SIGMOD international conference on Management of data, pages 207–216. ACM Press, 1993.

    Google Scholar 

  2. Daniel Barbara and Sushil Jajodia, editors. Applications of Data Mining in Computer Security. Kluwer Academic Publishers, Norwell, MA, USA, 2002.

    Google Scholar 

  3. Markus M. Breunig, Hans-Peter Kriegel, Raymond T. Ng, and J Sander. Lof: identifying density-based local outliers. In Proceedings of the 2000 ACM SIGMOD international conference on Management of data, pages 93–104. ACM Press, 2000.

    Google Scholar 

  4. Varun Chandola and Vipin Kumar. Summarization — compressing data into an informative representation. In Fifth IEEE International Conference on Data Mining, pages 98–105, Houston, TX, November 2005.

    Google Scholar 

  5. William W. Cohen. Fast effective rule induction. In International Conference on Machine Learning (ICML), 1995.

    Google Scholar 

  6. Dorothy E. Denning. An intrusion-detection model. IEEE Trans. Softw. Eng., 13(2):222–232, 1987.

    Google Scholar 

  7. Eric Eilertson, Levent ErtΘz, Vipin Kumar, and Kerry Long, Minds — a new approach to the information security process. In 24th Army Science Conference. US Army, 2004.

    Google Scholar 

  8. Levent ErtΘz, Eric Eilertson, Aleksander Lazarevic, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, and Paul Dokas. MINDS — Minnesota Intrusion Detection System. In Data Mining — Next Generation Challenges and Future Directions. MIT Press, 2004.

    Google Scholar 

  9. Levent Ertoz, Michael Steinbach, and Vipin Kumar. Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data. In Proceedings of 3rd SIAM International Conference on Data Mining, May 2003.

    Google Scholar 

  10. Anil K. Jain and Richard C. Dubes. Algorithms for Clustering Data. Prentice-Hall, Inc., 1988.

    Google Scholar 

  11. Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan. Fast portscan detection using sequential hypothesis testing. In IEEE Symposium on Security and Privacy, 2004.

    Google Scholar 

  12. Vipin Kumar, Jaideep Srivastava, and Aleksander Lazarevic, editors. Managing Cyber Threats-Issues, Approaches and Challenges, Springer Verlag, May 2005.

    Google Scholar 

  13. Aleksandar Lazarevic, Levent ErtΘz, Vipin Kumar, Aysel Ozgur, and Jaideep Srivastava. A comparative study of anomaly detection schemes in network intrusion detection. In SIAM Conference on Data Mining (SDM), 2003.

    Google Scholar 

  14. C. Lickie and R. Kotagiri. A probabilistic approach to detecting network scans. In Eighth IEEE Network Operations and Management, 2002.

    Google Scholar 

  15. Kerry Long. Catching the cyber-spy, arl’s interrogator. In 24th Army Science Conference, US Army, 2004.

    Google Scholar 

  16. V. Paxon. Bro: a system for detecting network intruders in real-time. In Eighth IEEE Network Operators and Management Symposium (NOMS), 2002.

    Google Scholar 

  17. Phillip A. Porras and Alfonso Valdes. Live traffic analysis of tcp/ip gateways. In NDSS, 1998.

    Google Scholar 

  18. Seth Robertson, Eric V. Siegel, Matt Miller, and Salvatore J. Stolfo. Surveillance detection in high bandwidth environments. In DARPA DISCEX III Conference, 2003.

    Google Scholar 

  19. Martin Roesch. Snort: Lightweight intrusion detection for networks. In USA, pages 229–238, 1999.

    Google Scholar 

  20. Gyorgy Simon, Hui Xiong, Eric Eilertson, and Vipin Kumar. Scan detection: A data mining approach. Technical Report AHPCRC 038, University of Minnesota — Twin Cities, 2005.

    Google Scholar 

  21. Gyorgy Simon, Hui Xiong, Eric Eilertson, and Vipin Kumar. Scan detection: A data mining approach. In Proceedings of SIAM Conference on Data Mining (SDM), 2006.

    Google Scholar 

  22. Anoop Singhal and Sushil Jajodia. Data mining for intrusion detection. In Data Mining and Knowledge Discovery Handbook, pages 1225–1237. Springer, 2005.

    Google Scholar 

  23. Stuart Staniford, James A. Hoagland, and Joseph M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105–136, 2002.

    Google Scholar 

  24. Pang-Ning Tan, Michael Steinbach, and Vipin Kumar. Introduction to Data Mining, Addison-Wesley, May 2005.

    Google Scholar 

  25. Nicholas Weaver, Stuart Staniford, and Vern Paxson. Very fast containment of scanning worms. In 13th USENIX Security Symposium, 2004.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Chandola, V., Eilertson, E., Ertoz, L., Simon, G., Kumar, V. (2007). Minds: Architecture & Design. In: Data Warehousing and Data Mining Techniques for Cyber Security. Advances in Information Security, vol 31. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-47653-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-47653-7_6

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-26409-7

  • Online ISBN: 978-0-387-47653-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics