





Weighted Nebulous Matching over Frequent Episode Rules Using Internet Anomaly Detection
Subscribe/Renew Journal
A new Internet traffic data mining technique presented for generating frequent episode rules (FER)[1]. Adaptive base-support threshold is applied to different axis attributes in these rules. We use the rules to build anomaly-based, network intrusion detection systems (NIDS)[2]. The episode rules detect anomalous sequences of TCP [3], UDP [4], or ICMP [5] connections. Three new pruning techniques are devised to reduce the rule search space by 70% in our bench mark experiments. Testing our scheme over real-life Internet trace data collected at USC mixed with 10 days of MIT/LL attack data, we encountered 20 or less false alarms over 200 network attacks. We detect with a success rate of 47% of all unknown network attacks. These results show a 51%improvement over the NIDS built with association rules, exclusively.
Keywords
Network Security, Intrusion Detection Systems, Anomaly Detection, Internet Traffic Analysis, Frequent Episode Rules, False Alarms and Adaptive Data Mining.
User
Subscription
Login to verify subscription
Font Size
Information