skip to main content
10.1145/545056.545147acmconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
Article

Application of a distributed data mining approach to network intrusion detection

Published:15 July 2002Publication History

ABSTRACT

In very many situations the collection of data from distributed hosts for its subsequent use to generate an intrusion detection profile may not be technically feasible (e.g., due to data size or network security transfer protocols). This situation is especially evident for data intensive intrusion profile generation (e.g., inducing profiles via data mining techniques). An alternative solution is to build a network profile by applying distributed data analysis methods (e.g., agent based computing). Such an approach is described in this paper. Global profiles are built using a Distributed Data Mining approach that integrates inductive generalization and Agent based computing. In this approach, classification rules are learned via tree induction from distributed data to be used as intrusion profiles. Agents, in a collaborative fashion, generate partial trees and communicate the temporary results among them in the form of indices to the data records. The process is terminated when a final tree is induced. This communication mechanism does not involve any data transfers, and in addition, a compression approach is used to reduce the communication bandwidth of data index transfers.

References

  1. Hudjarian, Ali Baik, Sung Bala, Jerzy; InferAgent - A Decision Tree Induction From Distributed Data Algorithm; Proceedings of the 5th World Multi-Conference on Systemics, Cybernetics and Informatics, Orlando, FL July, 2001.Google ScholarGoogle Scholar
  2. Ingram, H. Kremerm, Steven Rowe, Neil C., Distributed Intrusion Detection for Computer Systems Using Communicating Agents, Proceedings of the 2000 Command and Control Research and Technology Symposium, Monterey, CA, June 2000.Google ScholarGoogle Scholar
  3. Kumar, Sandeep, Classification and Detection of Computer Intrusions. Department of Computer Sciences, Purdue University, Ph.D Dissertation, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lee, Wenke Stolfo, Salvatore J., Data Mining Approaches for Intrusion Detection, Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Neumann, Peter Porras, Phillip A., Experience with EMERALD to Date, Proceedings 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sobirey, Michael Richter, Birk, The Intrusion Detection System AID, Brandenburg University of Technology at Cottbus, On-line at http://www-rnks.informatik.tu-cottbus.de/~sobirey/aid.e.html.Google ScholarGoogle Scholar

Index Terms

  1. Application of a distributed data mining approach to network intrusion detection

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 3
      July 2002
      451 pages
      ISBN:1581134800
      DOI:10.1145/545056

      Copyright © 2002 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 July 2002

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      Overall Acceptance Rate1,155of5,036submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader