skip to main content
article

Data mining aided signature discovery in network-based intrusion detection system

Published:01 October 2002Publication History
Skip Abstract Section

Abstract

In Network-based Intrusion Detection, signatures discovery is an important issue, since the performance of an intrusion detection system heavily depends on accuracy and abundance of signatures. In most cases, we have to find these signatures manually. This is a time-consuming and error-prone work. Some papers introduce data mining into Intrusion Detection System. However, there are some drawbacks in these schemes. We present a data mining based approach to supporting signature discovery in network-based Intrusion Detection System. It has people find signatures of an intrusion easily. The main idea is that: First, Signature Discovery System (SDS) tries to find the most possible signatures that occur very frequently in the communication monitored. Second, SDS will find the relationships between these candidate signatures and construct rules based on these relationships found. Finally, SDS gives two kinds of hints: one is the signatures whose frequency of occurrence is greater than a threshold; the other is a set of rules composed of a set of signatures that are created by SDS in the second step. An experimental system called SigSniffer has been implemented to test the feasibility of the proposed approach.

References

  1. Anderson, J. P. 1980. Computer security threat monitoring and surveillance. Tech. Rep. Anderson Co. Fort Washington, PA.Google ScholarGoogle Scholar
  2. Julia Allen. 2000. State of the Practice of Intrusion Detection Technologies, page 38, http://www.sei.cmu.edu/pub/documents/99.reports/pdf/99tr028.pdf.Google ScholarGoogle Scholar
  3. Paxson, Vern. Bro: A System for Detecting Network Intruders in Real-Time, Proceedings of 7th USENIX Security Symposium. San Antonio, TX, January 1998 {online}. http://www.aciri.org/vern/papers.html Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Van Ryan, Jane. SAIC's Center for Information Security Technology Releases CMDS Verson 3.5 {online}. http://www.saic.com/news/may98/news05-15-98.html (1998).Google ScholarGoogle Scholar
  5. Cisco. NetRanger {online}. URL: http://www.cisco.com/warp/public/778/security/netranger/ (1999).Google ScholarGoogle Scholar
  6. Marty Roesch. Snort --- Lightweight Intrusion Detection for Networks. http://www.snort.org/documentation.html.Google ScholarGoogle Scholar
  7. Wenke Lee. Data Mining Approaches for Intrusion Detection. 7th USENIX Security Symposium, San Antonio, Texas. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Eric Bloedorn, Alan D. Data Mining for Network Intrusion Detection: How to Get Started. http://www.mitre.org/support/papers/tech_papers_01/bloedorn_datamining/bloedorn_datamining.pdf.Google ScholarGoogle Scholar
  9. R. Agrawal and R. Srikant, Fast Algorithms for mining association rules,Proc. Of 20th VLDB Conference, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Data mining aided signature discovery in network-based intrusion detection system
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader