Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/951949.952127guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Learning Rules for Anomaly Detection of Hostile Network Traffic

Published: 19 November 2003 Publication History
  • Get Citation Alerts
  • Abstract

    We introduce an algorithm called LERAD that learnsrules for finding rare events in nominal time-series datawith long range dependencies. We use LERAD to findanomalies in network packets and TCP sessions to detectnovel intrusions. We evaluated LERAD on the 1999DARPA/Lincoln Laboratory intrusion detection evaluationdata set and on traffic collected in a universitydepartmental server environment.

    References

    [1]
    R. Agrawal & R. Srikant, "Fast Algorithms for Mining Association Rules", Proc. 20th Intl. Conf. Very Large Data Bases, 1994.
    [2]
    D. Barbara, J. Couto, S. Jajodia, L. Popyack, & N. Wu, "ADAM: Detecting Intrusions by Data Mining", Proc. IEEE Workshop on Information Assurance and Security, 2001, pp. 11-16.
    [3]
    J. Hoagland, SPADE, Silicon Defense, http://www.silicondefense.com/software/spice/, 2000.
    [4]
    W. E. Leland, M. S. Taqqu, W. Willinger, & D. W. Wilson, "On the Self-Similar Nature of Ethernet Traffic", Proc. ACM SIGComm, 1993.
    [5]
    R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, & K. Das (2000), "The 1999 DARPA Off-Line Intrusion Detection Evaluation", Computer Networks 34(4), 2000, pp. 579-595.
    [6]
    M. Mahoney. Source code for PHAD, ALAD, LERAD, NETAD, SAD, EVAL3, EVAL4, EVAL and AFIL.PL is available at http://cs.fit.edu/~mmahoney/dist/
    [7]
    M. Mahoney & P. K. Chan, "Learning Rules for Anomaly Detection of Hostile Network Traffic", Florida Tech. technical report CS-2003-16, 2003.
    [8]
    V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time", Proc. 7'th USENIX Security Symposium, 1998.
    [9]
    V. Paxson, S. Floyd, "The Failure of Poisson Modeling", IEEE/ACM Transactions on Networking (3), 1995, pp. 226-244.
    [10]
    M. Roesch, "Snort - Lightweight Intrusion Detection for Networks", Proc. USENIX Lisa, 1999.
    [11]
    A. Valdes & K. Skinner, "Adaptive, Model-based Monitoring for Cyber Attack Detection", Proc. RAID, 2000, pp. 80-92.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICDM '03: Proceedings of the Third IEEE International Conference on Data Mining
    November 2003
    ISBN:0769519784

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 19 November 2003

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Host-Based Intrusion Detection System with System CallsACM Computing Surveys10.1145/321430451:5(1-36)Online publication date: 19-Nov-2018
    • (2018)Building A Fast Intrusion Detection System For High-Speed-NetworksProcedia Computer Science10.1016/j.procs.2018.01.151127:C(521-530)Online publication date: 1-May-2018
    • (2016)Characterizing network traffic behaviour using granule-based association rule miningNetworks10.1002/nem.193526:4(308-329)Online publication date: 1-Jul-2016
    • (2014)Learning from the pastProceedings of the 8th ACM International Conference on Distributed Event-Based Systems10.1145/2611286.2611289(47-58)Online publication date: 26-May-2014
    • (2013)Mining multidimensional contextual outliers from categorical relational dataProceedings of the 25th International Conference on Scientific and Statistical Database Management10.1145/2484838.2484883(1-4)Online publication date: 29-Jul-2013
    • (2013)SVDD-based outlier detection on uncertain dataKnowledge and Information Systems10.1007/s10115-012-0484-y34:3(597-618)Online publication date: 1-Mar-2013
    • (2013)Enhancing Rough Clustering with Outlier Detection Based on Evidential ClusteringProceedings of the 14th International Conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume 817010.1007/978-3-642-41218-9_14(127-137)Online publication date: 11-Oct-2013
    • (2011)Enforcing security with behavioral fingerprintingProceedings of the 7th International Conference on Network and Services Management10.5555/2147671.2147682(64-72)Online publication date: 24-Oct-2011
    • (2010)Distance-based outlier detectionProceedings of the VLDB Endowment10.14778/1920841.19210213:1-2(1469-1480)Online publication date: 1-Sep-2010
    • (2009)Anomaly extraction in backbone networks using association rulesProceedings of the 9th ACM SIGCOMM conference on Internet measurement10.1145/1644893.1644897(28-34)Online publication date: 4-Nov-2009
    • Show More Cited By

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media