REAL TIME DETECTION OF NOVEL ATTACKS BY MEANS OF DATA MINING TECHNIQUES

Marcello Esposito, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano, Carlo Sansone

Abstract

Rule-based Intrusion Detection Systems (IDS) rely on a set of rules to discover attacks in network traffic. Such rules are usually hand-coded by a security administrator and statically detect one or few attack types: minor modifications of an attack may result in detection failures. For that reason, signature based classification is not the best technique to detect novel or slightly modified attacks. In this paper we approach this problem by extracting a set of features from network traffic and computing rules which are able to classify such traffic. Such techniques are usually employed in off line analysis, as they are very slow and resource-consuming. We want to assess the feasibility of a detection technique which combines the use of a common signature-based intrusion detection system and the deployment of a data mining technique. We will introduce the problem, describe the developed architecture and show some experimental results to demonstrate the usability of such a system.

References

  1. (2004). Operation Experience with High-Volume Network Intrusion Detection. ACM.
  2. Andersson, D. (1995). Detecting usual program behavior using the statistical component of the next-generation intrusion detection expert system (nides). Technical report, Computer Science Laboratory.
  3. Bace, R. G. (2000). Intrusion Detection. Macmillan Technical Publishing.
  4. Baker, A. R., Caswell, B., and Poor, M. (2004). Snort 2.1 Intrusion Detection - Second Edition. Syngress.
  5. Barbara, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N. (2001). Adam: Detecting intrusion by data mining. pages 11-16. IEEE. Workshop on Information Assurance and Security.
  6. Cohen, W. W. and Singer, Y. (1999). A simple, fast, and effective rule learner.
  7. Elkan, C. (2000). Results of the kdd99 classifier learning. In SIGKDD Explorations, volume 1, pages 63-64. ACM.
  8. Fayyad, U., Piatetsky-Shapiro, G., and Smyth, P. (1996). From data mining to knowledge discovery in databases. AI Magazine, pages 37-52.
  9. Laing, B. and Alderson, J. (2000). How to guide - implementing a network based intrusion detection system. Technical report, Internet Security Systems, Sovereign House, 57/59 Vaster Road, Reading.
  10. Lee, W. and Stolfo, S. J. (2000). A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227-261.
  11. Paxson, V. and Terney, B. (2004). Bro reference manual.
  12. Sleator, D. and Tarjan, R. (1985). Self Adjusting Binary Search Trees. Journal of the ACM, 32(3).
  13. Tyson, M. (2000). Derbi: Diagnosys explanation and recovery from computer break-ins. Technical report.
  14. Vigna, G. and Kemmerer, R. (1999). Netstat: a network based intrusion detection system. Journal of Computer Security, 7(1).
  15. 6http://sourceforge.net/projects/
Download


Paper Citation


in Harvard Style

Esposito M., Mazzariello C., Oliviero F., Pietro Romano S. and Sansone C. (2005). REAL TIME DETECTION OF NOVEL ATTACKS BY MEANS OF DATA MINING TECHNIQUES . In Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 972-8865-19-8, pages 120-127. DOI: 10.5220/0002536601200127


in Bibtex Style

@conference{iceis05,
author={Marcello Esposito and Claudio Mazzariello and Francesco Oliviero and Simon Pietro Romano and Carlo Sansone},
title={REAL TIME DETECTION OF NOVEL ATTACKS BY MEANS OF DATA MINING TECHNIQUES},
booktitle={Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2005},
pages={120-127},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002536601200127},
isbn={972-8865-19-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Seventh International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - REAL TIME DETECTION OF NOVEL ATTACKS BY MEANS OF DATA MINING TECHNIQUES
SN - 972-8865-19-8
AU - Esposito M.
AU - Mazzariello C.
AU - Oliviero F.
AU - Pietro Romano S.
AU - Sansone C.
PY - 2005
SP - 120
EP - 127
DO - 10.5220/0002536601200127