z-logo
open-access-imgOpen Access
TOWARDS DATA MINING TEMPORAL PATTERNS FOR ANOMALY INTRUSION DETECTION SYSTEMS
Author(s) -
Sam Sengupta,
Bruno Andriamanalimanana,
Stuart W. Card,
Pradnya Kadam,
Saket Ranwadkar,
Kaustav Das,
Sagar V. Parikh
Publication year - 2014
Publication title -
computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.184
H-Index - 11
eISSN - 2312-5381
pISSN - 1727-6209
DOI - 10.47839/ijc.2.2.205
Subject(s) - intrusion detection system , computer science , anomaly detection , anomaly (physics) , data mining , anomaly based intrusion detection system , a priori and a posteriori , data stream mining , warning system , mode (computer interface) , state (computer science) , host (biology) , variety (cybernetics) , computer security , artificial intelligence , algorithm , physics , operating system , telecommunications , ecology , philosophy , epistemology , biology , condensed matter physics
A reasonably light-weight host and net-centric Network IDS architecture model is indicated. The model is anomaly based on a state-driven notion of “anomaly”. Therefore, the relevant distribution function need not remain constant; it could migrate from states to states without any a priori warning so long as its residency time at a next steady state is sufficiently long to make valid observations there. Only those intrusion events (basically DOS and DDOS variety) capable of triggering anomalous streams of attacks/response both near and/or far of target monitoring point(s) are considered at the first level of detection. At the next level of detection, the filtered states could be fine-combed in a batch mode to mine unacceptable strings of commands or known attack signatures.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here