Browse > Article
http://dx.doi.org/10.6109/jkiice.2007.11.12.2287

ANIDS(Advanced Network Based Intrusion Detection System) Design Using Association Rule Mining  

Jeong, Eun-Hee (강원대학교 지역경제학과)
Lee, Byung-Kwan (관동대학교 컴퓨터학과)
Abstract
The proposed ANIDS(Advanced Network Intrusion Detection System) which is network-based IDS using Association Rule Mining, collects the packets on the network, analyze the associations of the packets, generates the pattern graph by using the highly associated packets using Association Rule Mining, and detects the intrusion by using the generated pattern graph. ANIDS consists of PMM(Packet Management Module) collecting and managing packets, PGGM(Pattern Graph Generate Module) generating pattern graphs, and IDM(Intrusion Detection Module) detecting intrusions. Specially, PGGM finds the candidate packets of Association Rule large than $Sup_{min}$ using Apriori algorithm, measures the Confidence of Association Rule, and generates pattern graph of association rules large than $Conf_{min}$. ANIDS reduces the false positive by using pattern graph even before finalizing the new pattern graph, the pattern graph which is being generated is compared with the existing one stored in DB. If they are the same, we can estimate it is an intrusion. Therefore, this paper can reduce the speed of intrusion detection and the false positive and increase the detection ratio of intrusion.
Keywords
NIDS; Support; Confidence;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Eric Boledan, Alan D. Christiansen, William Hill, Clement Skorupka, Lisa M. Talbot, Jonathan Tivel, 'Data Mining for Network Intrusion Detection: How to Get Started', The MITRE Corporation, http://www.mitre.org/work/tech_papers/tech_papers_01/bloedorn_datamining/bloedorn_ datamining.pdf
2 Martin Roesch, 'Snort - Lightweight Intrusion Detection for Network'
3 Christopher Kruegel, Tomas Toth and ClemensKerer, 'Decentralized Event Correlation for Intrusion Detection', 2002. 4
4 황현욱, 김민수, 노봉남, '감사로그 상관관계를 통한 호스트 기반의 침입탐지시스템', 정보보호학회논문지, 제 13권 제 3호, pp. 81-90, 2003.6
5 http://www.mic.go.kr/index.jsp
6 Jyothna R., Nayak and Diane J. Cook, 'Approximate Association Rule Mining', http://ranger.uta.edu/~cook/pubs/flairsj01.pdf
7 노광민, '리눅스에서 pcap libraty를 사용하여 패킷을 잡아보기 vO.3 2000, 09. 14., 리눅스 한글 문서 프로젝트
8 이상훈, 소진, '데이터 마이닝 기반침입탐지 패턴 알고리즘의 설계 및 구현', 정보처리학회 논문지 Vol. 6, N0.10-C, pp.717-726, 2003. 9
9 James Cannady and Jay harell, 'A Comparatice Analysis of Current Intrusion Detection Technologies', February, 1998