期刊文献+

DoS detections based on association rules and frequent itemsets

DoS detections based on association rules and frequent itemsets
下载PDF
导出
摘要 To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and user behaviors. The method extracts information from the log analysis of submitted packets using the algorithm which depends on the definition of the intrusion. Large itemsets were extracted to represent the super facts to build the association analysis for the intrusion. Network data files were analysed for experiments. The analysis and experimental results are encouraging with better performance as packet frequency number increases. To detect the DoS in networks by applying association rules mining techniques, we propose that association rules and frequent itemsets can be employed to find DoS pattern in packet streams which describe traffic and user behaviors. The method extracts information from the log analysis of submitted packets using the algo- rithm which depends on the definition of the intrusion. Large itemsets were extracted to represent the super facts to build the association analysis for the intrusion. Network data files were analysed for experiments. The analysis and experimental results are encouraging with better performance as packet frequency number increases.
出处 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2008年第2期283-289,共7页 哈尔滨工业大学学报(英文版)
关键词 自动控制技术 资料数据 采矿技术 信息包 data mining intrusion packets streams
  • 相关文献

参考文献10

  • 1Parxson V.An analysis of using reflectors for distributed denial-of-service attacks[].Computer Communication Re- view.2001
  • 2Teng W,Chen M,Yu P.A regression-based temporal pat- tern mining scheme for data streams[].Proceedings of the th ACM VLDB International Conference on Very Large Data Bases.2003
  • 3Yu J,Chong Z,Lu H,et al.False positive or false nega- tive: mining frequent itemsets from high speed transactional data streams[].Proceedings of the th ACMVLDB Interna- tional Conference on Very Large Data Bases.2004
  • 4Chang J,Lee W.Finding recent frequent item sets adap- tively over online data streams[].Proceedings of the thACM SIGKDD International Conference on Knowledge Discovery and Data Mining.2003
  • 5Agrawal R,Imielinski T,Swami A.Mining association rules between sets of items in large databases[].Proceedings of the th ACM SIGMOD International Conference on Management of Data.1993
  • 6Agrawal R,Srikant R.Mining sequential patterns[].Pro- ceedings of the th IEEE ICDE International Conference on Data Engineering.1995
  • 7Jung J,Krishnamurthy B,Rabinovich M.Flash crowds and denial of service attacks: Characterization and implica-tions for CDNs and web sites[].The Eleventh International World Wide Web Conference (WWW ).2002
  • 8Keromytis A,Misra V,Rubenstein D.SOS: secure over- lay services[].Proceedings of ACM SIGCOMM.2002
  • 9Meiss M,Menczer F,Vespignani A.On the lack of typi- cal behavior in the global web traffic network[].Proceedings of the th WWW International World Wide Web Confer- ence.2005
  • 10Mankin A,Massey D,Wu C L,et al.On design andeval- uation of intentiondriven ICMP traceback[].Proceedings of IEEE International Conference on Computer Communica- tions and Networks.2001

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部