Integrating Data Mining Techniques with Intrusion Detection Methods
2000; Springer Science+Business Media; Linguagem: Inglês
10.1007/978-0-387-35508-5_3
ISSN1868-422X
AutoresRavi Mukkamala, Jason Gagnon, Sushil Jajodia,
Tópico(s)Anomaly Detection Techniques and Applications
ResumoIntrusion detection systems like NIDES depend on the ability to characterize a user’s past behavior based on his/her usage patterns. The characterization is typically made in terms of statistics drawn on system parameters such as CPU, I/O and network loads, and file access patterns. For example, NIDES maintains statistics on approximately 25 such parameters for each user. The cost of data collection, statistics computation, and intrusion detection are directly proportional to the number of parameters maintained per user. If we would like to achieve real-time responses to intrusion detection, then we need to minimize the number of parameters without adversely affecting the detection capabilities. In this chapter, we propose to use some of the feature reduction and selection techniques commonly used in data mining applications to reduce the computational and storage requirements of the intrusion detection methods. Since typically several of the user behavioral parameters are correlated, applying these techniques may reduce the number of parameters needed to represent the user behavior.
Referência(s)