skip to main content
10.1145/2513228.2513284acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
short-paper

Improved signature based intrusion detection using clustering rule for decision tree

Published:01 October 2013Publication History

ABSTRACT

Malicious network data are becoming more and more serious nowadays. To deal with this problem, IDSs are used popularly as a security technology that helps to discover, determine and identify unauthorized use of information systems. However, the attacking technologies are becoming more complicated and require more time to detect. In order to make sure that IDS can work efficiently and accurately, novel algorithms need to be applied to adapt to the quick change of attacking technologies. There are many algorithms that are proposed to work on the matching process. Kruegel et al. generated a decision tree that is utilized to find malicious input items using as few redundant comparisons as possible [1].

In this paper, we improve Kruegel's algorithm by changing the clustering strategy for building the decision tree. The experiments show that the quality of the output decision tree could be significantly improved.

References

  1. C. Kruegel and T. Toth, Automatic Rule Clustering for improved, signature based Intrusion Detection, tech. Report, Distributed System Group, Technical Univ. Vienna, Austria.Google ScholarGoogle Scholar
  2. Wu S. and Manber U. A Fast Algorithm for Multi-Pattern Search. Technical Report TR94-17, Dept. Computer Science, Univ. of Arizona, 1994.Google ScholarGoogle Scholar
  3. Aho A. V and Corasick M. J. Efficient String Matching: An Aid to Bibliographic Search. Comm. ACM, 18, 6, 330--340, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Snort, http://www.snort.org, 2012.Google ScholarGoogle Scholar
  5. IDS from wikipedia, http://en.wikipedia.org/wiki/IDS.Google ScholarGoogle Scholar
  6. Wenke Lee, Sal Stolfo, and Kui Mok. A Data Mining Framework for Building Intrusion Detection Models. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.Google ScholarGoogle Scholar
  7. Sheu, T.-F., Huang, N.-F and Lee, H.-P., In-Depth Packet Inspection Using a Hierarchical Pattern Matching Algorithm. IEEE Transactions on Dependable and Secure Computing, 7, 2 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Quinlan JR, Introduction of Decision Trees, Machine Learning, Vol. 1, pp. 81--106, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Quinlan, JR. Discovering rules by induction from large collections of examples. In Expert Systems in the Micro-Electronic Age. Edinburgh University Press, 1979.Google ScholarGoogle Scholar

Index Terms

  1. Improved signature based intrusion detection using clustering rule for decision tree

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      RACS '13: Proceedings of the 2013 Research in Adaptive and Convergent Systems
      October 2013
      529 pages
      ISBN:9781450323482
      DOI:10.1145/2513228

      Copyright © 2013 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 October 2013

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      RACS '13 Paper Acceptance Rate73of317submissions,23%Overall Acceptance Rate393of1,581submissions,25%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader