Predictive security model using data mining

作者: S.P. Alampalayam , A. Kumar

DOI: 10.1109/GLOCOM.2004.1378401

关键词: Intrusion detection systemPrincipal component analysisDimension (data warehouse)Artificial intelligenceData miningComputer scienceRandom projectionMachine learningComputer security modelVulnerability (computing)Benchmark (computing)

摘要: We propose a practical and predictive security model for intrusion detection in computer networking environment using data mining. This uses classification regression technique The goal of the proposed is to identify significant variables that measure network from wealth raw perform an efficient vulnerability evaluation based on those variables. Analysis experimental results conducted DARPA benchmark dataset shows CART (classification trees) approach performs better compared other models, like random projection principal component analysis. also indicate performance not significantly affected, even as dimension input decreases, without compromising prediction success rate.

参考文章(14)
Qing-An Zeng, Dharma P. Agrawal, Hongmei Deng, Network Intrusion Detection System Using Random Projection Technique. Security and Management. pp. 10- 16 ,(2003)
Alin Dobra, Johannes Gehrke, Bias Correction in Classification Tree Construction international conference on machine learning. pp. 90- 97 ,(2001)
Eleazar Eskin, Anomaly Detection over Noisy Data using Learned Probability Distributions international conference on machine learning. pp. 255- 262 ,(2000) , 10.7916/D8C53SKF
Eugene H. Spafford, Sandeep Kumar, A Software Architecture to Support Misuse Intrusion Detection ,(1995)
Richard A Olshen, Charles J Stone, Leo Breiman, Jerome H Friedman, Classification and regression trees ,(1983)
Levent Ertoz, Aleksandar Lazarevic, Paul Dokas, Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava, Data Mining for Network Intrusion Detection ,(2002)
Sathishkumar Alampalayam, Anup Kumar, An Adaptive and Predictive Security Model for Mobile Ad hoc Networks Wireless Personal Communications. ,vol. 29, pp. 263- 281 ,(2004) , 10.1023/B:WIRE.0000047074.61412.D8
Yongguang Zhang, Wenke Lee, Intrusion detection in wireless ad-hoc networks acm/ieee international conference on mobile computing and networking. pp. 275- 283 ,(2000) , 10.1145/345910.345958
Salvatore J. Stolfo, Wenke Lee, Philip K. Chan, Wei Fan, Eleazar Eskin, Data mining-based intrusion detectors: an overview of the columbia IDS project international conference on management of data. ,vol. 30, pp. 5- 14 ,(2001) , 10.1145/604264.604267
Wenke Lee, Salvatore J. Stolfo, A framework for constructing features and models for intrusion detection systems ACM Transactions on Information and System Security. ,vol. 3, pp. 227- 261 ,(2000) , 10.1145/382912.382914