Efficient mining and detection of sequential intrusion patterns for network intrusion detection systems

Mei Ling Shyu, Zifang Huang, Hongli Luo

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Scopus citations

Abstract

In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

Original languageEnglish (US)
Title of host publicationMachine Learning in Cyber Trust
Subtitle of host publicationSecurity, Privacy, and Reliability
PublisherSpringer US
Pages133-154
Number of pages22
ISBN (Print)9780387887340
DOIs
StatePublished - Dec 1 2009

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'Efficient mining and detection of sequential intrusion patterns for network intrusion detection systems'. Together they form a unique fingerprint.

  • Cite this

    Shyu, M. L., Huang, Z., & Luo, H. (2009). Efficient mining and detection of sequential intrusion patterns for network intrusion detection systems. In Machine Learning in Cyber Trust: Security, Privacy, and Reliability (pp. 133-154). Springer US. https://doi.org/10.1007/978-0-387-88735-7_6