Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2003.10C.6.717

Design and Implementation of the Intrusion Detection Pattern Algorithm Based on Data Mining  

Lee, Sang-Hoon (국방대학교 전산정보학과)
Soh, Jin (공군 정비창)
Abstract
In this paper, we analyze the associated rule based deductive algorithm which creates the rules automatically for intrusion detection from the vast packet data. Based on the result, we also suggest the deductive algorithm which creates the rules of intrusion pattern fast in order to apply the intrusion detection systems. The deductive algorithm proposed is designed suitable to the concept of clustering which classifies and deletes the large data. This algorithm has direct relation with the method of pattern generation and analyzing module of the intrusion detection system. This can also extend the appication range and increase the detection speed of exiting intrusion detection system as the rule database is constructed for the pattern management of the intrusion detection system. The proposed pattern generation technique of the deductive algorithm is used to the algorithm is used to the algorithm which can be changed by the supporting rate of the data created from the intrusion detection system. Fanally, we analyze the possibility of the speed improvement of the rule generation with the algorithm simulation.
Keywords
Dataminung; Association rules; Intrusion Detection Pattern Algorithm;
Citations & Related Records
연도 인용수 순위
  • Reference
1 W. Lee and S. J. Stolfo. 'Data mining approaches for intrusion detection,' In In Proceedings of the 1998 USENIX Security Symposium. 1998
2 Eric Bloedorn 외 'Data Mining for Network Intrusion Detection ; How to Get Started,' The MITRE Corporation, In http://www.afcea.org/pastevents/db2001/BIoedorn_files/frame.htm, 2001
3 Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, 'A Data Mining Framework for Building Intrusion Detection Models,' IEEE Symposium on Security and Privacy, In http://citeseer.nj.nec.com/154973.html, 1999   DOI
4 http://www.snort.org/
5 http://www.tcpdump.org/
6 Paul E. Proctor, 'The Practical Intrusion Detection Handbook,' Prentice Hall PTR, www.phptr.com, Feb., 2000
7 이경하 외, '네트워크 패킷 정보를 기반으로한 보안 관리', 한국정보과학회논문지, Vol.25, No.12, pp.1405-1412, Dec., 1998
8 Ramakrishnan Srikant, Rakesh Agrawal, 'Mining Generalized Association Rules,' Proceedings of the 21st VLDB Conference, IBM Almaden Research Center, 1995
9 김화수, '지능정보시스템 개론', 국방대학교, May, 2001
10 Tamas Abraham, 'IDDM : Intrusion Detection using Data Mining Techniques,' In Information Technology Division Electronics & Surveillance Research Laboratory, 2001
11 Kristin R. Nauta and Frank Lieble, 'Offline Network lntrution Detection; Mining tcpdump Data to Identify,' In http://www.sas.com/service/library/onlinedoc/itsv/intrusion.pdf, 1999