Data Mining for Cyber Security

نویسندگان

  • Varun Chandola
  • Eric Eilertson
  • Levent Ertöz
  • György Simon
  • Vipin Kumar
چکیده

This chapter provides an overview of the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security. The various components of MINDS such as the scan detector, anomaly detector and the profiling module detect different types of attacks and intrusions on a computer network. The scan detector aims at detecting scans which are the percusors to any network attack. The anomaly detection algorithm is very effective in detecting behavioral anomalies in the network traffic which typically translate to malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. The profiling module helps a network analyst to understand the characteristics of the network traffic and detect any deviations from the normal profile. Our analysis shows that the intrusions detected by MINDS are complementary to those of traditional signature based systems, such as SNORT, which implies that they both can be combined to increase overall attack coverage. MINDS has shown great operational success in detecting network intrusions in two live deployments at the University of Minnesota and as a part of the Interrogator architecture at the US Army Research Labs Center for Intrusion Monitoring and Protection (ARL-CIMP).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Data Warehousing and Data Mining Techniques for Cyber Security

Why should wait for some days to get or receive the data warehousing and data mining techniques for cyber security advances in information security book that you order? Why should you take it if you can get the faster one? You can find the same book that you order right here. This is it the book that you can receive directly after purchasing. This data warehousing and data mining techniques for...

متن کامل

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

An intrusion detection system is software that monitors a single or a network of computers for malicious activities that are aimed at stealing or censoring information or corrupting network protocols. Most technique used in today’s intrusion detection system are not able to deal with the dynamic and complex nature of cyber-attacks on computer networks. Even though efficient adaptive methods lik...

متن کامل

Digital Forensics and Cyber Crime Datamining

Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper propo...

متن کامل

Data Mining in Security Applications

In recent years, research in many security areas has gained a lot of interest among scientists in academia, industry, military and governmental organizations. Researchers have been investigating many advanced technologies to effectively solve acute security problems. Data mining has certainly been one of the most explored technologies successfully applied in many security applications ranging f...

متن کامل

DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing

We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application the Minnesota Intrusion Detection System (MINDS), which uses a suite of data mining based algorithms to address different aspects of cyber security including malicious activities such as denial-of-service (DoS) traffic, worms, policy violations and inside abuse. M...

متن کامل

Application of Data Mining Techniques for Information Security in a Cloud: A Survey

India is progressively moving ahead in the field of Information technology. The concept of e-commerce is already in place whereas e-governance is also on the same track. Similarly other sectors like health, judiciaries etc. are following the path. With the advent of information technology, malevolent people now have another option to cause damage to people by doing cyber attacks rather than phy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006