入侵检测的时间分析

Mofreh A. Hogo
{"title":"入侵检测的时间分析","authors":"Mofreh A. Hogo","doi":"10.1109/CCST.2014.6987012","DOIUrl":null,"url":null,"abstract":"Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.","PeriodicalId":368721,"journal":{"name":"2014 International Carnahan Conference on Security Technology (ICCST)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Temporal analysis of intrusion detection\",\"authors\":\"Mofreh A. Hogo\",\"doi\":\"10.1109/CCST.2014.6987012\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.\",\"PeriodicalId\":368721,\"journal\":{\"name\":\"2014 International Carnahan Conference on Security Technology (ICCST)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 International Carnahan Conference on Security Technology (ICCST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.2014.6987012\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2014.6987012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

入侵检测系统(IDS)正在成为网络安全基础设施的重要组成部分。数据挖掘工具被广泛用于开发IDS。在入侵的时态数据挖掘分析(即不同时间段的入侵检测)方面缺乏研究。大多数研究都集中在入侵检测系统的最新快照数据挖掘上。本文提出了一种新的基于naïve贝叶斯网络的入侵检测系统时序数据挖掘分析技术。该系统考虑了时间维度,并建立了许多不同的分类器模型,以获得对入侵者的准确分析。所获得的结果提供了对不同时间段内入侵者行为的更多关注和深入理解,并说明了入侵者类别在时间片上的缩小和扩展(入侵者从一个段迁移到另一个段)。入侵者的时间分析可以帮助对特定类型的攻击采取适当的决策(决策必须与入侵者的行为相适应)。结果表明,该方法降低了可能出现的高误报率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Temporal analysis of intrusion detection
Intrusion detection system (IDS) is becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing IDS. There is a lack of researches in the temporal data mining analysis of the intrusions (intrusions detection over different time periods). Most of researches are focusing on the latest snapshot data mining of intrusion detection systems. This work presented in this paper proposes a new temporal data mining analysis technique of intrusion detection systems based on naïve Bayes networks. The presented system considered the time dimension and built many different classifier models to obtain an accurate analysis of intruders. The obtained results give more focusing and deep understanding of the intruders' behavior during the different time periods and illustrate the shrinking and expansions of intruders' classes over the time slices (the migrations of intruders from one segment to another), The temporal analysis of intruders can help in taking an appropriate decision against specific type of attacks (decisions must be suitable with the intruder behaviour). The results indicate the reduction of the possible high positive false rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Revealing fire survivors hidden behind smoke and flames by IR active imaging systems Leakage-resilient memory-based physical unclonable function using phase change material An on-line intrusion detection approach to identify low-rate DoS attacks An investigation into biometric signature capture device performance and user acceptance Privacy leakages in Smart Home wireless technologies
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1