skip to main content
article

ADAM: a testbed for exploring the use of data mining in intrusion detection

Published:01 December 2001Publication History
Skip Abstract Section

Abstract

Intrusion detection systems have traditionally been based on the characterization of an attack and the tracking of the activity on the system to see if it matches that characterization. Recently, new intrusion detection systems based on data mining are making their appearance in the field. This paper describes the design and experiences with the ADAM (Audit Data Analysis and Mining) system, which we use as a testbed to study how useful data mining techniques can be in intrusion detection.

References

  1. R. Agrawal, T. Imielinski, , and A. Swami. Mining association rules between sets of items in large databases. In Proc. of the ACM SIGMOD Conference on Management of Data, Washington D.C., May 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Anderson and T. Frivold and A. Valdes. NIDES: A Summary. In http://www.sdl.sri.com/nides/index5.htmlGoogle ScholarGoogle Scholar
  3. D. Anderson and T. Lunt and H. Javitz and A. Tamaru and A. Valdes. Detecting unusual program behavior using the statistical component of the Next-generation Intrusion Detection Expert System (NIDES). Technical Report, SRI-CSL-95-06, Computer Science Laboratory, SRI International, May 1995.Google ScholarGoogle Scholar
  4. D. Barbará and J. Couto and S. Jajodia and N. Wu. ADAM: Detecting Intrusions by Data Mining. Proceedings of the IEEE SMC Information Assurance Workshop, West Point, NY, 2001.Google ScholarGoogle Scholar
  5. D. Barbará and N. Wu and S. Jajodia. Detecting Novel Network Intrusions Using Bayes Estimators. Proceedings of the First SIAM International Conference on Data Mining, April 2001, Chicago, USA.Google ScholarGoogle ScholarCross RefCross Ref
  6. V. Barnett and T. Lewis. Outliers in Statistical Data. 3rd Edition. Wiley, 1994.Google ScholarGoogle Scholar
  7. Y.M.M. Bishop and S.E. Fienberg. Discrete Multivariate Analysis: Theory and Practice. The MIT Press, 1975.Google ScholarGoogle Scholar
  8. W.W. Cohen. Fast Effective Rule Induction. In Proceedings of the 12th International Conference on Machine Learning, Lake Taho, CA, 1995.Google ScholarGoogle ScholarCross RefCross Ref
  9. D.E. Denning. An Intrusion Detection Model. In IEEE Transactions on Software Engineering, February 1997, pp. 222-228. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. U.M. Fayyad, G. Piatesky-Shapiro, P. Smyth, and R. Uthurusamy. Advances in Knowledge Discovery and Data Mining. AIII/MIT Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. General Accounting Office. Information Security: Computer Attacks at Department of Defense Pose Increasing Risks. GAO/AIMD-96-84, May, 1996.Google ScholarGoogle Scholar
  12. K. Ilgun. USTAT: A Real-Time Intrusion Detection System for UNIX. Master Thesis, University of California, Santa Barbara, November 1992.Google ScholarGoogle Scholar
  13. H.S. Javitz and A. Valdes, The SRI IDES Statistical Anomaly Detector. In http://www.sdl.sri.com/nides/index5.htmlGoogle ScholarGoogle Scholar
  14. W. Lee and S. Stolfo. Data Mining Approaches for Intrusion Detection. In Proceedings of the 7th USENIX Security Symposium, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Lee and S.Stolfo and K. Mok. A Data Mining Framework for Building Intrusion Detection Models. In Proceedings of the IEEE Symposium on Security and Privacy, 1999.Google ScholarGoogle Scholar
  16. W. Lee and S.J. Stolfo and K. Mok. Mining Audit Data to Build Intrusion Detection Models. In Proceedings of the International Conference on Knowledge and Data Mining, August 1998.Google ScholarGoogle Scholar
  17. U. Lindqvist, P.A. Porras. Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST). In Proceedings of the 1999 IEEE Symposium on Security and Privacy. pp. 146-161.Google ScholarGoogle Scholar
  18. T.F. Lunt and R Jagannathan. A Prototype Real-Time Intrusion-Detection Expert System. In Proceedings of the IEEE Symposium on Security and Privacy, 1988, pp. 18-21.Google ScholarGoogle Scholar
  19. MIT Lincoln Laboratories DARPA Intrusion Evaluation Detection. In http://www.ll.mit.edu/IST/ideval/Google ScholarGoogle Scholar
  20. R. Mukkamala and J. Gagnon and S. Jajodia. Integrating Data Mining Techniques with Intrusion Detection. In Proceedings of the XIII Annual IFIP WG 11.3 Working Conference On Database Security, Seattle, WA, July 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. P.A. Porras. STAT: A State Transition Analysis for Intrusion Detection. Master Thesis, Computer Science Department, University of California, Santa Barbara, 1992.Google ScholarGoogle Scholar
  22. P.A. Porras and P.G. Neumann EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In Proceedings of the National Information Systems Security Conference, 1997, pp. 353-365.Google ScholarGoogle Scholar
  23. I. Sager et al. Cyber Crime. In Business Week, February 21, 2000.Google ScholarGoogle Scholar
  24. S. Smaha. Haystack audit trail analysis system. Status Report HS-STAT.TXT Haystack Laboratories, Colorado, Aug., 1990.Google ScholarGoogle Scholar
  25. H.L. Van Trees. Detection, Estimation, and Modulation Theory, Radar-Sonar Signal Processing and Gaussian Signals in Noise. John Wiley & Sons, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. G. Vigna and R. Kemmerer. NetStat: A Network-Based Intrusion Detection Approach. In Proceedings of the 14t Annual Information Theory: 50 Years of Discovery Computer Security Application Conference, Dec. 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. I.H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. ADAM: a testbed for exploring the use of data mining in intrusion detection

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader