Skip to main content

REAL TIME DETECTION OF NOVEL ATTACKS BY MEANS OF DATA MINING TECHNIQUES

  • Conference paper
Enterprise Information Systems VII

Abstract

Rule-based Intrusion Detection Systems (IDS) rely on a set of rules to discover attacks in network traffic. Such rules are usually hand-coded by a security administrator and statically detect one or few attack types: minor modifications of an attack may result in detection failures. For that reason, signature based classification is not the best technique to detect novel or slightly modified attacks. In this paper we approach this problem by extracting a set of features from network traffic and computing rules which are able to classify such traffic. Such techniques are usually employed in off line analysis, as they are very slow and resource-consuming. We want to assess the feasibility of a detection technique which combines the use of a common signature-based intrusion detection system and the deployment of a data mining technique. We will introduce the problem, describe the developed architecture and show some experimental results to demonstrate the usability of such a system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • (2004). Operation Experience with High-Volume Network Intrusion Detection. ACM.

    Google Scholar 

  • Andersson, D. (1995). Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides). Technical report, Computer Science Laboratory.

    Google Scholar 

  • Bace, R. G. (2000). Intrusion Detection. Macmillan Technical Publishing.

    Google Scholar 

  • Baker, A. R., Caswell, B., and Poor, M. (2004). Snort 2.1 Intrusion Detection-Second Edition. Syngress.

    Google Scholar 

  • Barbara, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N. (2001). Adam: Detecting intrusion by data mining. pages 11–16. IEEE. Workshop on Information Assurance and Security.

    Google Scholar 

  • Cohen, W. W. and Singer, Y. (1999). A simple, fast, and effective rule learner.

    Google Scholar 

  • Elkan, C. (2000). Results of the kdd99 classifier learning. In SIGKDD Explorations, volume 1, pages 63–64. ACM.

    Article  Google Scholar 

  • Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P. (1996). From data mining to knowledge discovery in databases. AI Magazine, pages 37–52.

    Google Scholar 

  • Laing, B. and Alderson, J. (2000). How to guide-implementing a network based intrusion detection system. Technical report, Internet Security Systems, Sovereign House, 57/59 Vaster Road, Reading.

    Google Scholar 

  • Lee, W. and Stolfo, S. J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227–261.

    Article  Google Scholar 

  • Paxson, V. and Terney, B. (2004). Bro reference manual.

    Google Scholar 

  • Sleator, D. and Tarjan, R. (1985). Self Adjusting Binary Search Trees. Journal of the ACM, 32(3).

    Google Scholar 

  • Tyson, M. (2000). Derbi: Diagnosys explanation and recovery from computer break-ins. Technical report.

    Google Scholar 

  • Vigna, G. and Kemmerer, R. (1999). Netstat: a network based intrusion detection system. Journal of Computer Security, 7(1).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer

About this paper

Cite this paper

Esposito, M., Mazzariello, C., Oliviero, F., Romano, S.P., Sansone, C. (2007). REAL TIME DETECTION OF NOVEL ATTACKS BY MEANS OF DATA MINING TECHNIQUES. In: Chen, CS., Filipe, J., Seruca, I., Cordeiro, J. (eds) Enterprise Information Systems VII. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-5347-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-5347-4_22

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-5323-8

  • Online ISBN: 978-1-4020-5347-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics