skip to main content
10.1145/1046290.1046321acmconferencesArticle/Chapter ViewAbstractPublication PagesinfosecuConference Proceedingsconference-collections
Article

A framework of cooperating intrusion detection based on clustering analysis and expert system

Published:14 November 2004Publication History

ABSTRACT

This paper first analyzes and compares misuse detection and anomaly detection. Misuse detection can't detect new or unknown intrusion, while anomaly detection has the shortcoming on detection rate and false alarm rate. In order to overcome their respective shortcomings, we propose a framework of cooperating intrusion detection based on clustering analysis and expert system. It can meet the demand of real-time detection through clustering method and detect new or unknown intrusion. It integrates the virtues of both misuse detection and anomaly detection to improve the detection performance. Moreover it converts unknown intrusion to known intrusion, hence improves the detection accuracy and efficiency.

References

  1. Lunt, T. Tamaru, A. Gilham, F. Jagann-athan, R. Nermann, P. Javitz, H. Valdes, A. Garvey, T. A real-time intrusion detection expert system (IDES) final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo park, California, 1992.Google ScholarGoogle Scholar
  2. Debar, H. Becker, M. Siboni, D. A neural network component for an intrusion detection system. In: Proceedings of the 1992 IEEE computer society symposium on research in security and privacy held on Oakland, 1992, 256--266. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Forrest, S. Perelson, S. A. Allen, L. Self-nonself discrimination in a computer {C}. In: proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, Los Alamos, CA, IEEE Computer Society Press, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jun-zhong Zhao. Hou-kuan Huang. An intrusion detection system based on data mining and immune principles. In: Proceedings of the First International Conference on Machine learning and Cybernetics, Beijing, 2002, 524--528.Google ScholarGoogle Scholar
  5. Lee, W. Srolfo, S. J. Mok, K. W. A Data Mining Framework for Building Intrusion Detection Models{C}. In: IEEE Symposium on Security and Privacy, 1999, 120--132.Google ScholarGoogle Scholar
  6. Lee, W. Stolfo, S. J. Mok, K. W. Mining in a data-flow environment: experience in intrusion detection. submitted for publication, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Portnoy, L. Eskin, E. Stolfo, S. J. Intrusion detection with unlabeled data using clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001). Philadelphia, ACM Press, 2001(11).Google ScholarGoogle Scholar
  8. Guan, Y. Ghorbani, A. Belacel, N. Y-means: A clustering method for intrusion detection. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, Canada, 2003, 1083--1086.Google ScholarGoogle Scholar
  9. Xiangyang, Li. Clustering and Classification Algorithm for Computer Intrusion Detection {PhD.}, Arizona State University, December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Debra, Anderson. Thane Frivold. Alfonso Valdes. Next-generation Intrusion Detection Expert System (NIDES) A Summary. Computer Science Laboratory, SRI-CSL-95-07, 1995.Google ScholarGoogle Scholar
  11. Lindqvist, U. Porras, P. A. Detecting computer and network misuse through the production-based expert system toolset (P-BEST). In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, 146--161.Google ScholarGoogle ScholarCross RefCross Ref
  12. Tsang, E. C. C. Yeung, D. S. Wang, X. Z. OFFSS: optimal fuzzy-valued feature subset selection. Fuzzy Systems, IEEE Transactions, April 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Schuschel, D. Chun-Nan, Hsu. A weight analysis-based wrapper approach to neural nets feature subset selection. In: Tenth IEEE International Conference on, Tools with Artificial Intelligence, 1998.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    InfoSecu '04: Proceedings of the 3rd international conference on Information security
    November 2004
    266 pages
    ISBN:1581139551
    DOI:10.1145/1046290

    Copyright © 2004 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 14 November 2004

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • Article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader