skip to main content
10.1145/1066677.1067006acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Enhancing network intrusion detection systems with interval methods

Published:13 March 2005Publication History

ABSTRACT

Two main approaches for network intrusion detection are misuse detection [6] and anomaly detection [11]. The limitation of the misuse approach is that cannot effectively detect new patterns of intrusions that are not precisely encoded in the system [11]. The anomaly detection approach usually produces a large number of false alarms [1, 7]. In addition, anomaly detection requires intensive computations on a large amount of training data to characterize normal behavior patterns.In this paper, we try to apply interval technology to enhance network intrusion detection systems (IDS). By storing network state data into interval valued bi-temporal database, we better sample the stream of network states. We represent the likelihood of intrusions associated with an m x n interval valued rule matrix that can be obtained from the database with relatively low computational complexity. By grouping nearby patterns with intervals, we may significantly reduce false alarms. The O(n) computational cost of maintaining the rules makes it possible to integrate the IDS with network management systems for almost real-time automatic network control. Our probabilistic approach with the rule matrix model can be further applied to study the pattern evolution of network intrusions.

References

  1. R. Bace and P. Mell, "Intrusion Detection Systems," Special Publication on Intrusion Detection Systems from National Institute of Standards and Technology, 2000.Google ScholarGoogle Scholar
  2. D. Barbara, N. Wu, and S. Jajodia (Eds.), "Applications of Data Mining in Computer Security," Kluwer Academic Publishers, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Bridges and R. Vaufhn, "Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection," Proceeding of 23rd National Information Security Conference, 2000.Google ScholarGoogle Scholar
  4. P. Chen, A. de Korvin, and C. Hu, "Association Analysis with Interval Valued Fuzzy Sets and Body of Evidence," Proceedings of the 2002 IEEE World Congress on Computational Intelligence, pp. 518--523, 2002Google ScholarGoogle Scholar
  5. A. de Korvin, C. Hu, and P. Chen, "Generating and Applying Rules for Interval Valued Fuzzy Observations," Lecture Notes in Computer Science, Vol. 3177, pp. 279--284, Springer-Verlag, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  6. K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State Transition Analysis: A Rule-based Intrusion Detection Approach," IEEE Transactions on Software Engineering, Vol. 21, No. 3, pp. 181--199, March 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Julisch, "Clustering Intrusion Detection Alarms to Support Root Cause Analysis," ACM Transactions on Information and System Security, Vol. 6, No. 4, pp. 443--471, November 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Kumar and E. Spafford, "A Software Architecture to Support Misuse Intrusion Detection," in 18th National Information Security Conference, pp. 194--204, 1995.Google ScholarGoogle Scholar
  9. S. Manganaris, M. Christensen, D. Zerkle, and K. Hermiz, "A Data Mining Analysis of RTID Alarms," Computer Networks, pp. 571--577, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. F. Roddick, and M. Spiliopoulou, "A Survey of Temporal Knowledge Discovery Paradigms and Methods," IEEE Transaction on Knowledge and Data Engineering, Vol. 14, No. 4, pp. 750--767, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Seleznyov and S. Puuronen, "Anomaly Intrusion Detection Systems: Handling Temporal Relations between Events," in Recent Advances Intrusion Detection, 1999.Google ScholarGoogle Scholar
  12. R. T. Snodgrass, editor. The TSQL2 Temporal Query Language, chapter 10, Kluwer Academic Publishers, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Spiliopoulou, J. F. Roddick, "Higher Order Mining: modeling and Mining the Results of Knowledge Discovery," Proc. Second International Conference on Data Mining Methods and Databases, 2000.Google ScholarGoogle Scholar
  14. D. C. Verma, "Simplifying Network Administration Using Policy-based Management," IEEE Network Magazine, Vol. 16, No. 2, pp. 20--26, March 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhancing network intrusion detection systems with interval methods

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SAC '05: Proceedings of the 2005 ACM symposium on Applied computing
            March 2005
            1814 pages
            ISBN:1581139640
            DOI:10.1145/1066677

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 March 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,650of6,669submissions,25%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader