2000
DOI: 10.1145/382912.382914
|View full text |Cite
|
Sign up to set email alerts
|

A framework for constructing features and models for intrusion detection systems

Abstract: Intrusion detection (ID) is an important component of infrastructure protection mechanisms. Intrusion detection systems (IDSs) need to be accurate, adaptive, and extensible. Given these requirements and the complexities of today's network environments, we need a more systematic and automated IDS development process rather than the pure knowledge encoding and engineering approaches. This article describes a novel framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection. This frame… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
413
0
8

Year Published

2004
2004
2021
2021

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 723 publications
(422 citation statements)
references
References 14 publications
1
413
0
8
Order By: Relevance
“…A RIPPER classifier method was suggested (Lee and Stolfo, 2001;Lee et al, 2002) to induce rules from the data by employing a divide-andconquer approach and involving either discarding or pruning some of the learnt rules is carried out to increase the classifier accuracy. RIPPER classifier has been successfully used in data mining based anomaly detection algorithms to classify incoming audit data and detect intrusions.…”
Section: Classification-based Anomaly Detectionmentioning
confidence: 99%
“…A RIPPER classifier method was suggested (Lee and Stolfo, 2001;Lee et al, 2002) to induce rules from the data by employing a divide-andconquer approach and involving either discarding or pruning some of the learnt rules is carried out to increase the classifier accuracy. RIPPER classifier has been successfully used in data mining based anomaly detection algorithms to classify incoming audit data and detect intrusions.…”
Section: Classification-based Anomaly Detectionmentioning
confidence: 99%
“…Lee and Stolfo [18] first proposed a framework of using data mining algorithms to extract features of audit records and processing these records by means of machine learning algorithms. Then, machine learning algorithms have become epidemic in reducing the false alarms.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Misuse detection models the patterns of known attacks or vulnerabilities, and identifies actions that conform to such patterns as attacks. Existing approaches include rule-based methods (e.g., ASAX [26], P-BEST [25]), state transition based methods [5], [14], and data mining approaches [22], [23]. Most of these techniques cannot be directly applied to sensor networks due to the resource constraints on sensor nodes.…”
Section: Intrusion Detectionmentioning
confidence: 99%