By Topic

Implementation of sequence patterns mining in network intrusion detection system

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Yang Xiang-Rong ; Dept. of Comput. Sci. & Technol., Xi'an Jiaotong Univ., China ; Song Qin-Bao ; Shen Jun-Yi

In this paper we present a frequent sequence pattern mining-based algorithm used for network intrusion detection, which is an application and extension of the SPADE algorithm. It is based on the idea that much behavior on the network appears as sequences of activities, according to the sequence patterns we computed, we can construct the intrusion rule base and legal action rule base, then we can detect known and novel intrusion activities by rule matching. In addition, when the system is running, we use an incremental sequence pattern mining algorithm to complement the rule library in order to avoid re-executing the algorithm on the entire dataset, thereby reducing execution time. The experimental results indicate that this algorithm is efficient enough to meet the needs for active detection of intrusion. Compared with most existing methods used in commercial systems which are built using purely knowledge engineering approaches, our algorithm is more intelligent and adaptive

Published in:

Info-tech and Info-net, 2001. Proceedings. ICII 2001 - Beijing. 2001 International Conferences on  (Volume:5 )

Date of Conference: