International Journal of Computational Intelligence Systems (Feb 2012)

Intrusion Detection Models Based on Data Mining

  • Guojun Mao,
  • Xindong Wu,
  • Xuxian Jiang

DOI
https://doi.org/10.1080/18756891.2012.670519
Journal volume & issue
Vol. 5, no. 1

Abstract

Read online

Computer intrusions are taking place everywhere, and have become a major concern for information security. Most intrusions to a computer system may result from illegitimate or irregular calls to the operating system, so analyzing the system-call sequences becomes an important and fundamental technique to detect potential intrusions. This paper proposes two models based on data mining technology, respectively called frequency patterns () and tree patterns () for intrusion detection. employs a typical method of sequential mining based on frequency analysis, and uses a short sequence model to find out quickly frequent sequential patterns in the training system-call sequences. makes use of the technique of tree pattern mining, and can get a quality profile from the training system-call sequences of a given system. Experimental results show that has good performances in training and detecting intrusions from short system-call sequences, and can achieve a high detection precision in handling long sequences.

Keywords