Browse > Article

(Design of data mining IDS for new intrusion pattern)  

편석범 (동강대학 전자정보과)
정종근 (동강대학 전자정보과)
이윤배 (조선대학교 컴퓨터공학부)
Publication Information
Abstract
IDS has been studied mainly in the field of the detection decision and collecting of audit data. The detection decision should decide whether successive behaviors are intrusions or not , the collecting of audit data needs ability that collects precisely data for intrusion decision. Artificial methods such as rule based system and neural network are recently introduced in order to solve this problem. However, these methods have simple host structures and defects that can't detect changed new intrusion patterns. So, we propose the method using data mining that can retrieve and estimate the patterns and retrieval of user's behavior in the distributed different hosts.
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Ghosh and A. Schwartzbard. 'A study in detection'. In proceedings of the Eighth USENIX security Symposium, 1999
2 T. lane and C. E. Brodley. 'Detecting abnormal:Machine learning in computer security', Technical Report TR-ECE 97-1, Prudue University, West Lafayette, IN, 1997
3 Jai Sundar B. Spafford E, 'Software Agents for Intrusion Detection,' Technical Report, Purdue University, Department of Computer Science, 1997
4 Crosbie M, Spafford E, 'Defending a Computer System using Autonomous Agents,' Technical Report, Purdue University, Department of Computer Science, 1996
5 Wenke Lee, Salvatore J.Stolfo, Philip k.Chan, 'Real Time Data Mining-based Intrusion Detection'. In proceedings of IEEE symposium on research in security and privacy, 2000
6 은유진, 박정호, '침입 탐지 기술 분류 및 기술적 구성요소', 정보보호센터 정보보호 뉴스 1998.7 통권 13호
7 T. Lane and C. E. Brodley. "Temporal sequence learning and data reduction dor anomaly detection“. In Processsing of the fifth ACM Conference on Computer and Communications Security, pages 150-158, 1998
8 W.Lee, S.J.Stolfo, and K.Mok, 'A Data Mining Framework for Building Intrusion Detection Models', 1999 IEEE Symposium on security and Privacy, 1999
9 W. Lee, S. J. Stolfo. 'Data mining approaches for intrusion detection'. In Proceding of the 1998 USENIX security Symposium, 1998
10 편석범,정종근, 이윤배, '데이터 마이닝 기법을 적용한 최적 침입 탐지 모듈 설계', 1999. 춘계정보과학회 논문집
11 T. Fawcett and F. Provost. 'Adaptive fraud detection Data Mining and Knowledge Discovery'. 1:291-316, 1997
12 Sandeep Kumar, gene Spafford. “A Pattern Matching Model for Misuse Intrusion Detection”, Proceedings of the 17th National Computer Security Conference, October 1994
13 편석범, 정종근, 이윤배, '패턴 추출 에이전를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능평가', 2000,12 대한전자공학회 논문지(TE권)