Skip to main content

Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt

  • Chapter
Applications of Data Mining in Computer Security

Part of the book series: Advances in Information Security ((ADIS,volume 6))

Abstract

This chapter examines the state of modern intrusion detection, with a particular emphasis on the emerging approach of data mining. The discussion parallels two important aspects of intrusion detection: general detection strategy (misuse detection versus anomaly detection) and data source (individual hosts versus network traffic). Misuse detection attempts to match known patterns of intrusion, while anomaly detection searches for deviations from normal behavior. Between the two approaches, only anomaly detection has the ability to detect unknown attacks. A particularly promising approach to anomaly detection combines association raining with other forms of machine learning such as classification. Moreover, the data source that an intrusion detection system employs significantly impacts the types of attacks it can detect. There is a tradeoff in the level of detailed information available versus data volume. We introduce a novel way of characterizing intrusion detection activities: degree of attack guilt. It is useful for qualifying the degree of confidence associated with detection events, providing a framework in which we analyze detection quality versus cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Abraham, T. (2001). IDDM: Intrusion Detection using Data Mining Techniques. Technical Report DSTO-GD-0286, DSTO Electronics and Surveillance Research Laboratory.

    Google Scholar 

  • Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., and Stoner, E. (2000). State of the practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028, Software Engineering Institute, CMU, Pittsburgh, PA.

    Google Scholar 

  • Anderson, D., Lunt, T. F., Javitz, H., Tamaru, A., and Valdes, A. (1995a). Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES). Technical Report SRI-CSL-95–06, SRI International, Menlo Park, CA.

    Google Scholar 

  • Anderson, D., Lunt, T. F., Javitz, H., Tamaru, A., and Valdes, A. (1995b). Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System (NIDES). Technical Report SRI-CSL-95–06, Computer Science Laboratory, SRI International, Menlo Park, CA.

    Google Scholar 

  • Axelsson, S. (1999). Research in intrusion-detection systems: A survey. Technical Report TR: 98–17, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden.

    Google Scholar 

  • Axelsson, S. (2000a). The base-rate fallacy and the difficulty of intrusion detection.ACM Transactions on Information and System Security3(1):186–205.

    Article  Google Scholar 

  • Axelsson, S. (2000b). Intrusion detection systems: A survey and taxonomy. Technical report, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden.

    Google Scholar 

  • Barbara, D., Jajodia, S., Wu, N., and Speegle, B. (1999). Mining unexpected rules in network audit trails. Technical report, George Mason University.

    Google Scholar 

  • Barbara, D., Wu, N., and Jajodia, S. (2001). Detecting novel network intrusions using bayes estimators. InFirst SIAM Conference on Data MiningChicago, IL. Society for Industrial and Applied Mathematics.

    Google Scholar 

  • Bauer, D. S. and Koblentz, M. E. (1988). NIDX-An Expert System for Real-time. InComputer Networking Symposium.

    Google Scholar 

  • Cabrera, J. B. D., Ravichandran, B., and Mehra, R. K. (2000). Statistical traffic modeling for network intrusion detection. In8th International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems San Francisco, CA.

    Google Scholar 

  • CERT Advisory (2001). Multiple vulnerabilities in bind, computer emergency response. Technical Report CA-2001–02, Computer Emergency Response Center, Carnegie Mellon University. Available ashttp://www.cert.org /advisories/CA-2001-02.html

    Google Scholar 

  • Clifton, C. and Gengo, G. (2000). Developing custom intrusion detection filters using data mining. In21st Century Military Communications Conferencevolume 1, pages 440–443. IEEE Computer Society.

    Google Scholar 

  • Crosbie, M., Dole, B., Ellis, T., Krsul, I., and Spafford, E. (1996).IDIOT Users Guide.Purdue University, West Lafayette, IN. TR-96–050.

    Google Scholar 

  • CTC-Corporation (2000). Best of breed appendices. Tech Report 0017UU-TE-000712.

    Google Scholar 

  • Denning, D. E. (1987). An intrusion-detection model.IEEE Transactions on Software Engineering13:222–232.

    Article  Google Scholar 

  • Dowell, C. and Ramstedt, P. (1990). The computerwatch data reduction tool. In 13th National Computer Security Conference, Washington, DC.

    Google Scholar 

  • Engelhardt, D. (1997). Directions for intrusion detection and response: A survey. Technical Report DSTO-GD-0155, DSTO Electronics and Surveillance Research Laboratory.

    Google Scholar 

  • Esmaili, M., Balachandran, B., Safavi-Naini, R., and Pieprzyk, J. (1996). Case-based reasoning for intrusion detection. In12th Annual Computer Security Applications ConferenceSan Diego, CA.

    Google Scholar 

  • Esmaili, M., Safavi-Naini, R., and Balachandran, B. M. (1997). Auto-guard: A continuous case-based intrusion detection system. InTwen-tieth Australasian Computer Science Conference.

    Google Scholar 

  • Forrest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T. (1996). A sense of self for unix processes. InIEEE Symposium on Security and Privacypages 120–128, Oakland, CA. IEEE Computer Society.

    Google Scholar 

  • Ghosh, A. K. and Schwartzbard, A. (1999). A study in using neural networks for anomaly and misuse detection. InUsenix Security SymposiumWashington, DC.

    Google Scholar 

  • Heberlein, L. T., Mukherjee, B., and Levitt, K. N. (1992). Internet security monitor: An intrusion detection system for large-scale networks. In15th National Computer Security ConferenceBaltimore, MD.

    Google Scholar 

  • Helmer, G., Wong, J., Honavar, V., and Miller, L. (1999). Automated discovery of concise predictive rules for intrusion detection. Technical Report TR 99–01, Department of Computer Science, Iowa State University, Ames, IA.

    Google Scholar 

  • Hochberg, J., Jackson, K., Stallings, C., McClary, J., DuBois, D., and Ford, J. (1993). NADIR: An Automated System for Detecting Network Intrusions and Misuse.Computers and Security12(3):248–253.

    Article  Google Scholar 

  • Ilgun, K. (1992).USTAT A Real-time Intrusion Detection System for UNIX.Master of science, University of California Santa Barbara.

    Google Scholar 

  • Jackson, K. A. (1999). Intrusion Detection System (IDS) Product Survey. Technical Report LA-UR-99–3883, Los Alamos National Laboratory, Los Alamos, NM.

    Google Scholar 

  • Javitz, H. S. and Valdes, A. (1991). The SRI IDES Statistical Anomaly Detector. InIEEE Symposium on Research in Security and PrivacyOakland, CA.

    Google Scholar 

  • Jensen, K. (1997). A Brief Introduction to Coloured Petri Nets. Technical report, presented at Tools and Algorithms for the Construction and Analysis of Systems (TACAS) Workshop, Enschede, The Netherlands.

    Google Scholar 

  • Kemmerer, R. A. (1997). NSTAT: A Model-based Real-time Network Intrusion Detection System. Technical Report TR 1997–18, University of California Santa Barbara Department of Computer Science.

    Google Scholar 

  • Kohavi, R., Beckeer, B., and Sommerfield, D. (1997). Improving simple bayes. InEuropean Conference on Machine LearningPrague, Czech Republic.

    Google Scholar 

  • Kvarnstrom, H. (1999). A survey of commercial tools for intrusion detection. Technical Report TR 99–8, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden.

    Google Scholar 

  • Lane, T. D. (2000).Machine Learning Techniques for the Computer Security Domain of Anomaly Detection.Doctor of philosophy, Purdue University.

    Google Scholar 

  • LaPadula, L. J. (1999). State of the art in anomaly detection and reaction. Technical Report MP 99B0000020, The MITRE Corporation, Bedford, MA.

    Google Scholar 

  • LaPadula, L. J. (2000). Compendium of anomaly detection and reaction tools and projects. Technical Report MP 99B0000018R1, The MITRE Corporation, Bedford, MA.

    Google Scholar 

  • Lee, W. (1999). A data mining framework for constructing features and models for intrusion detection systems. Technical report, Graduate School of Arts and Sciences, Columbia University.

    Google Scholar 

  • Lee, W., Stolfo, S., and Mok, K. (2000). Adaptive intrusion detection: a data mining approach.Artificial Intelligence Review14:533–567.

    Article  MATH  Google Scholar 

  • Lee, W. and Stolfo, S. J. (1998). Data mining approaches for intrusion detection. InProceedings of the 7th USENIX Security SymposiumSan Antonio, TX.

    Google Scholar 

  • Lee, W., Stolfo, S. J., and Mok, K. W. (1999). A data mining framework for building intrusion detection models. InIEEE Symposium on Security and Privacy.

    Google Scholar 

  • Lee, W. and Xiang, D. (2001). Information-theoretic measures for anomaly detection. InIEEE Symposium on Security and Privacypages 130143, Oakland, CA. IEEE Computer Society.

    Google Scholar 

  • Liepins, G. and Vaccaro, H. (1989). Anomaly detection purpose and framework. In12th National Computer Security Conferencepages 495–504, Baltimore, MD. NIST and NSA.

    Google Scholar 

  • Liepins, G. E. and Vaccaro, H. S. (1992). Intrusion detection: It’s role and validation.Computers and Securitypages 347–355.

    Google Scholar 

  • Lin, J.-L., Wang, X. S., and Jajodia, S. (1998). Abstraction-based misuse detection: High-level specifications and adaptable strategies. In11th IEEE Computer Security Foundations Workshop.

    Google Scholar 

  • Lindqvist, U. and Porras, P. A. (1999). Detecting Computer and Network Misuse Through the Production-based Expert System Toolset (P-BEST). InIEEE Symposium on Security and Privacy.

    Google Scholar 

  • Lippmann, R. P., Fried, D. J., Graf, I., J. W. Haines, K. R. K., D., McClung, D. Weber, S. E. W., Wyschogrod, D., Cunningham, R. K.,, M., and Zissman, A. (2000). Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. InDARPA Information Survivability Conference and Exposition.

    Google Scholar 

  • Lundin, E. and Jonsson, E. (1999). Some practical and fundamental problems with anomaly detection. InProceedings of the Nordic Workshop on Secure Computer Systems.

    Google Scholar 

  • Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Jalali, C., Neumann, P. G., Javitz, H. S., Valdes, A., and Garvey, T. D. (1992). A Real Time Intrusion Detection Expert System (IDES). Technical report, SRI.

    Google Scholar 

  • Lunt, T. F. (1989). Real-time intrusion detection. Inpresented at COMPCON: Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage.

    Google Scholar 

  • Manganaris, S., Christensen, M., Zerkle, D., and Hermiz, K. (2000). A Data Mining Analysis of RTID Alarms.Computer Networks34(No. 4):571–577.

    Article  Google Scholar 

  • Net-Ranger (1999).NetRanger.Available athttp://www.nursingworld.org/ojin/topic30/tpc30_1.htm.

  • Neumann, P. G. and Porras, P. A. (1999). Experience with EMERALD to Date. InFirst Useniz Workshop on Intrusion Detection and Network MonitoringSanta Clara, CA.

    Google Scholar 

  • Ning, P. (2001).Abstraction-based Intrusion Detection in Distributed Environments.Doctor of philosophy, George Mason University.

    Google Scholar 

  • Porras, P. (1992).STAT: A State Transition Analysis for Intrusion De- tection.Master of science, University of California Santa Barbara.

    Google Scholar 

  • Porras, P. A. and Kemmerer, R. A. (1992). Penetration state transition analysis: A rule-based intrusion detection approach. InEighth Annual Computer Security Applications Conference.

    Google Scholar 

  • Porras, P. A. and Neumann, P. G. (1997). EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. InProceedings of the 20th National Information Systems Security ConferenceBalti-more, MD.

    Google Scholar 

  • Real-Secure (1999).RealSecure.Internet Security Systems. Available atwww.iss.net/customer_care/resource_center.

    Google Scholar 

  • Schultz, M. G., Eskin, E., Zadok, E., and Stolfo, S. J. (2001). Data mining methods for detection of new malicious executables. InIEEE Symposium on Security and PrivacyOakland, CA. IEEE Computer Society.

    Google Scholar 

  • Smaha, S. E. (1988). Haystack: An Intrusion Detection System. InFourth Aerospace Computer Security Applications Conference.

    Google Scholar 

  • Snapp, S., Brentano, J., Dias, G., Goan, T., Granee, T., Heberlein, L., Ho, C.-L., Levitt, K. N., Mukherjee, B., Mansur, D. L., Pon, K. L., and Smaha, S. E. (1991). A system for distributed intrusion detection. InCompcon Springpages 170–176. IEEE Computer Society.

    Google Scholar 

  • Somayaji, A., Hofmeyr, S., and Forrest, S. (1997). Principles of a computer immune system. InNew Security Paradigms WorkshopLangdale, Cumbria UK.

    Google Scholar 

  • Spafford, E. H. and Zamboni, D. (2000). Intrusion detection using autonomous agents.Computer Networks34(4):547–570.

    Article  Google Scholar 

  • Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R., and Zerkle, D. (1996). GrIDS-A Graph Based Intrusion Detection System for Large Networks. In19th National Information Systems Security Conferencepages 361–370, Baltimore, MD. NIST and NSA.

    Google Scholar 

  • Vaccaro, H. and Liepins, G. (1989). Detection of anomalous computer session activity. InIEEE Symposium on Security and Privacy.IEEE Computer Society.

    Google Scholar 

  • Valdes, A. and Skinner, K. (2000). Adaptive, model-based monitoring for cyber attack detection. InRecent Advances in Intrusion Detectionpages 80–93, Toulouse, France. Springer-Verlag.

    Chapter  Google Scholar 

  • Vigna, G. and Kemmerer, R. A. (1998). NetSTAT: A Network-based Intrusion Detection Approach. InProceedings of the International Conference on Knowledge and Data MiningNew York, NY.

    Google Scholar 

  • W. Lee, S. J. S. and Mok, K. W. (1998). Mining audit data to build intrusion detection models. InProceedings of the International Conference on Knowledge and Data MiningNew York, NY.

    Google Scholar 

  • Wagner, D. and Dean, R. (2001). Intrusion detection via static analysis. InIEEE Symposium on Security and Privacy.IEEE Computer Society.

    Google Scholar 

  • Wespi, A., Dacier, M., and Debara, H. (2000). Intrusion detection using variable-length audit trail patterns. InRecent Advances in Intrusion Detectionpages 110–129, Toulouse, FR. Springer-Verlag.

    Chapter  Google Scholar 

  • Winkler, J. R. (1990). A unix prototype for intrusion and anomaly detection in secure networks. In 13th National Computer Security Conference, Washington, DC.

    Google Scholar 

  • Winkler, J. R. and Landry, L. C. (1992). Intrusion and anomaly detection, isoa update. In 15th National Computer Security Conference, Baltimore, MD.

    Google Scholar 

  • Wu, N. (2001a).Audit Data Analysis and Mining.PhD thesis, George Mason University, Department of Information and Software Engineering. Fairfax, VA.

    Google Scholar 

  • Wu, N. (2001b). Research statement.

    Google Scholar 

  • Wu, S. F., Chang, H., Jou, F., Wang, F., Gong, F., Sargor, C., Qu, D., and Cleaveland, R. (1999). JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol.

    Google Scholar 

  • Yang, J., Ning, P., Wang, X. S., and Jajodia, S. (2000). CARDS: A Distributed System for Detecting Coordinated Attacks. In IFIP TC11 16th Annual Working Conference on Information Security, pages 171180. Kluwer.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer Science+Business Media New York

About this chapter

Cite this chapter

Noel, S., Wijesekera, D., Youman, C. (2002). Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. In: Barbará, D., Jajodia, S. (eds) Applications of Data Mining in Computer Security. Advances in Information Security, vol 6. Springer, Boston, MA. https://doi.org/10.1007/978-1-4615-0953-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4615-0953-0_1

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4613-5321-8

  • Online ISBN: 978-1-4615-0953-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics