Anomaly intrusion detection based on clustering a data stream

1Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In anomaly intrusion detection, how to model the normal behavior of activities performed by a user is an important issue. To extract the normal behavior as a profile, conventional data mining techniques are widely applied to a finite audit data set. However, these approaches can only model the static behavior of a user in the audit data set. This drawback can be overcome by viewing the continuous activities of a user as an audit data stream. This paper proposes a new clustering algorithm which continuously models a data stream. A set of features is used to represent the characteristics of an activity. For each feature, the clusters of feature values corresponding to activities observed so far in an audit data stream are identified by the proposed clustering algorithm for data streams. As a result, without maintaining any historical activity of a user physically, new activities of the user can be continuously reflected to the ongoing result of clustering. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Oh, S. H., Kang, J. S., Byun, Y. C., Jeong, T. T., & Lee, W. S. (2006). Anomaly intrusion detection based on clustering a data stream. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4176 LNCS, pp. 415–426). Springer Verlag. https://doi.org/10.1007/11836810_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free