Mining normal and intrusive activity patterns for computer intrusion detection

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion detection has become an important part of assuring the computer security. It borrows various algorithms from statistics, machine learning, etc. We introduce in this paper a supervised clustering and classification algorithm (CCAS) and its application in learning patterns of normal and intrusive activities and detecting suspicious activity records. This algorithm utilizes a heuristic in grid-based clustering. Several post-processing techniques including data redistribution, supervised grouping of clusters, and removal of outliers, are used to enhance the scalability and robustness. This algorithm is applied to a large set of computer audit data for intrusion detection. We describe the analysis method in using this data set. The results show that CCAS makes significant improvement in performance with regard to detection ability and robustness. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Li, X., & Ye, N. (2004). Mining normal and intrusive activity patterns for computer intrusion detection. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3073, 226–238. https://doi.org/10.1007/978-3-540-25952-7_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free