Skip to main content

Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4159))

Abstract

Modern network attacks range from fully automated to multilayer attacks. Vulnerabilities in a system are exploited by an intelligent attacker to facilitate to do anything from denial of service (DoS) attacks to the system takeover. This paper addresses the development of an architecture that includes the use of fault tolerance and honeypot technology to provide layered protection to avoid a single point of failure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Mellon, C.: Software Engineering Institute, CERT® Coordination Center (CERT/CC): CERT/CC Statistics (1988-2005) (2005), http://www.cert.org/stats/cert_stats.html

  2. Intrusion Detection, Honeypots and Incident Handling Resources (2005), http://www.honeypots.ne/

  3. Lunt, T.F., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P.G., Javitz, H., Valdes, A., Garvey, T.D.: A Real-Time Intrusion Detection Expert System (IDES)- Final Technical Report, Computer Science Laboratory, SRI International, Menlo Park, California (1992)

    Google Scholar 

  4. Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of A Network Level Intrusion Detection System, Technical report, Department of Computer Science, University of New Mexico (1990)

    Google Scholar 

  5. Pearl, J.: Probabilistic Reasoning in Expert Systems. Morgan Kaufmann, San Mateo (1988)

    Google Scholar 

  6. Oka, M., Oyama, Y., Abe, H., Kato, K.: Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 10–15. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Computer Networks 48, 717–738 (2005)

    Article  Google Scholar 

  8. Bolsky, M.I., Korn, D.G.: The KornShell Command and Programming Language. Prentice-Hall, Englewood Cliffs (1989)

    Google Scholar 

  9. Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: Proceedings of 1992 IEEE Computer Society Symposium, pp. 240–250 (1992)

    Google Scholar 

  10. Nuansri, N., Dillon, T.S., Singh, S.: An Application of Neural Network and Rule-Based System for Network Management: Application Level Problems. In: 30th Hawaii International Conference on System Sciences (HICSS), Advanced Technology Track, vol. 5, pp. 474–479 (1997)

    Google Scholar 

  11. Receive Only Sniffing Cable (2005), http://www.ironcomet.com/sniffer.html

  12. Sestito, S., Dillon, T.S.: Automated Knowledge Acquisition. Prentice Hall, New York (1994)

    MATH  Google Scholar 

  13. Nuansri, N., Dillon, T.S., Singh, S.: An application of neural network and rule- based system for network management: application level problems. In: Proceedings of the Thirtieth Hawaii International Conference, pp. 474–483 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pathak, L.D., Soh, B. (2006). Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks. In: Ma, J., Jin, H., Yang, L.T., Tsai, J.JP. (eds) Ubiquitous Intelligence and Computing. UIC 2006. Lecture Notes in Computer Science, vol 4159. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11833529_84

Download citation

  • DOI: https://doi.org/10.1007/11833529_84

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38091-7

  • Online ISBN: 978-3-540-38092-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics