Real time detection of novel attacks by means of data mining techniques

21Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Rule-based Intrusion Detection Systems (IDS) rely on a set of rules to discover attacks in network traffic. Such rules are usually hand-coded by a security administrator and statically detect one or few attack types: minor modifications of an attack may result in detection failures. For that reason, signature based classification is not the best technique to detect novel or slightly modified attacks. In this paper we approach this problem by extracting a set of features from network traffic and computing rules which are able to classify such traffic. Such techniques are usually employed in off line analysis, as they are very slow and resource-consuming. We want to assess the feasibility of a detection technique which combines the use of a common signature-based intrusion detection system and the deployment of a data mining technique. We will introduce the problem, describe the developed architecture and show some experimental results to demonstrate the usability of such a system.

Author supplied keywords

Cite

CITATION STYLE

APA

Esposito, M., Mazzariello, C., Oliviero, F., Romano, S. P., & Sansone, C. (2005). Real time detection of novel attacks by means of data mining techniques. In ICEIS 2005 - Proceedings of the 7th International Conference on Enterprise Information Systems (pp. 120–127). https://doi.org/10.1007/978-1-4020-5347-4_22

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free