A framework for constructing features and models for intrusion detection systems
Top Cited Papers
- 1 November 2000
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 3 (4) , 227-261
- https://doi.org/10.1145/382912.382914
Abstract
Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today's network environments, we need a more systematic and automated IDS development process rather that the pure knowledge encoding and engineering approaches. This article describes a novel framework, MADAM ID, for Mining Audit Data for Automated Models for Instrusion Detection. This framework uses data mining algorithms to compute activity patterns from system audit data and extracts predictive features from the patterns. It then applies machine learning algorithms to the audit records taht are processed according to the feature definitions to generate intrusion detection rules. Results from the 1998 DARPA Intrusion Detection Evaluation showed that our ID model was one of the best performing of all the participating systems. We also briefly discuss our experience in converting the detection models produced by off-line data mining programs to real-time modules of existing IDSs.Keywords
This publication has 6 references indexed in Scilit:
- State of the Practice of Intrusion Detection TechnologiesPublished by Defense Technical Information Center (DTIC) ,2000
- Temporal sequence learning and data reduction for anomaly detectionACM Transactions on Information and System Security, 1999
- The KDD process for extracting useful knowledge from volumes of dataCommunications of the ACM, 1996
- State transition analysis: a rule-based intrusion detection approachIEEE Transactions on Software Engineering, 1995
- Network intrusion detectionIEEE Network, 1994
- Mining association rules between sets of items in large databasesPublished by Association for Computing Machinery (ACM) ,1993