2001
DOI: 10.1145/604264.604268
|View full text |Cite
|
Sign up to set email alerts
|

Adam

Abstract: Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM (Audit Data Analysis and Mining) system, which we use as a testbed to study how useful data mining techniques can be in intrusion detection.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2004
2004
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 183 publications
(12 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…Data mining, however, lacks the local estimation and training aspects characteristics of conformal prediction, in general, and transduction, in particular, which provide for locality that reveals specific context, location, and time stamps. One early example for data mining use is audit data analysis and mining (ADAM) system [55] to discover attacks in a TCP dump audit trail using KDD 1999 for test bed and seeking DOS and PROBE attacks. ADAM leverages A Priori association mining to derive (antecedent to consequent) rules of legitimate behavior (e.g., profiles free of attacks) in terms of "normal" frequent item sets.…”
Section: Immunity and Detectionmentioning
confidence: 99%
“…Data mining, however, lacks the local estimation and training aspects characteristics of conformal prediction, in general, and transduction, in particular, which provide for locality that reveals specific context, location, and time stamps. One early example for data mining use is audit data analysis and mining (ADAM) system [55] to discover attacks in a TCP dump audit trail using KDD 1999 for test bed and seeking DOS and PROBE attacks. ADAM leverages A Priori association mining to derive (antecedent to consequent) rules of legitimate behavior (e.g., profiles free of attacks) in terms of "normal" frequent item sets.…”
Section: Immunity and Detectionmentioning
confidence: 99%
“…However, it is also a fact that the minority intrusions are more dangerous than the majority attacks. One of the problems of supervised anomaly intrusion detection approaches [26] is the high dependency on training data for normal activities.…”
Section: Data Mining In Idsmentioning
confidence: 99%
“…ad hoc is Latin and means "for this purpose‖. Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently [30]. Each must forward traffic unrelated to its own use, and therefore be a router.…”
Section: Intrusion Detection In Manetmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, developing a clustering or classification model for intrusion detection, which provide decision support to intrusion management for detecting known and unknown intrusions by discovering intrusion patterns [4,5].…”
Section: Introductionmentioning
confidence: 99%