Abstract
In Intrusion Detection Systems (IDS), many intelligent information processing methods, data mining technology and so on have been applied to improve detection accuracy for IPv4 network. IPv6 will inevitably take the place of IPv4 as the next generation of the Internet Protocol. Considering the problem of the urgent requirement of IDS for IPv6 networks, we present a novel intrusion detection model, and successfully applied it into an IPv6 experimental network in our lab. Lots of experiment indicated that this model can work well for intrusion detection for IPv6 network.
Supported by Scientific Research Common Program of Beijing Municipal Commission of Education (No: KM200810005030).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Jung, B.H., Lim, J.D., Kim, Y.H., Kim, K.Y.: An Analysis of Security Threats and Network Attacks in IPv6. Electronics and Telecommunications Trends 22(1), 37–50 (2007)
Kaeo, M., Green, D.: IPv6 Security Technology Paper. North American IPv6 Task Force(NAv6TF) Technology Report, Ver. 1.0, July 22 (2006)
Lim, J., Kim, Y., Jung, B., Kim, K., Kim, J., Lee, C.: Implementation of Multi-thread based Intrusion Prevention System for IPv6. In: International Conference on Control, Automation and Systems 2007, COEX, Seoul, Korea, October, pp. 404–407 (2007)
RFC 2375: IPv6 Multicast Address Assignments
RFC 2460: Internet Protocol, Version 6 (IPv6) Specification
RFC 2463: Internet Control Message Protocol (ICMPv6) for the IPv6 Specification
Bishop, M., Cheung, S., Wee, C., Frank, J., Hoagland, J., Samorodin, S.: The Threat from the Net. IEEE Spectrum 34(8), 56–63 (1997)
Frank, J.: Artificial Intelligence and Intrusion Detection: Current and Future Directions. In: 17th National Computer Security Conference, pp. 22–33 (October 1994)
Agrawal, R., Shafer, J.C.: Parallel mining of association rules. IEEE Transaction on Knowledge and Data Engineering 8(6), 962–969 (1996)
Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules in Large Database. In: Proceedings of 20th International Conference on Very large Data Bases, pp. 478–499 (September 1994)
Srikant, R., Agrawal, R.: Mining Generalized Association Rules. In: Proceedings of 20th International Conference on Very large Data Bases, pp. 407–419 (September 1995)
Lee, W., Stolfo, S.J., Mok, K.: Data mining in work flow environments: Experiences in intrusion detection. In: Proceedings of the 1999 Conference on Knowledge Discovery and Data Mining (KDD 1999) (1999)
Agrawal, R., Mannila, H., Srikant, R., Toivonen, H., Verkamo, A.: Fast Discovery of Association Rules. In: Advances in Knowledge Discovery and Data Mining. MIT Press, Cambridge (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Z., Lai, Y. (2009). A Data Mining Framework for Building Intrusion Detection Models Based on IPv6. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_62
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_62
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)