A sequential pattern mining algorithm for misuse intrusion detection

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents a sequential pattern mining algorithm for misuse intrusion detection, which can be used to detect application layer attack. The algorithm can distinguish the order of attack behavior, and overcome the limitation of Wenke Lee's method, which performs statistical analysis against intrusion behavior at the network layer with frequent episode algorithm. The algorithm belongs to behavior analysis technique based on protocol analysis. The preprocessed data of the algorithm are application layer connection records extracted from DARPA's tcpdump data by protocol analysis tools. We use vertical item-transaction data structure in the algorithm. Compared with Apriori All algorithm, the complexity of this algorithm is decreased greatly. Using this algorithm, we dig out an "intrusion-only" itemset sequential pattern, which is different from normal user command sequential pattern. Experiments indicate that our algorithm describes attacks more accurately, and it can detect those attacks whose features appear only once. Our presentation offers a new approach for the research of misuse intrusion detection. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Song, S. J., Huang, Z., Hu, H. P., & Jin, S. Y. (2004). A sequential pattern mining algorithm for misuse intrusion detection. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3252, 458–465. https://doi.org/10.1007/978-3-540-30207-0_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free