New method for intrusion features mining in IDS

  • Authors:
  • Wu Liu;Jian-Ping Wu;Hai-Xin Duan;Xing Li

  • Affiliations:
  • Network Research Center of Tsinghua University, Beijing, P. R. China;Network Research Center of Tsinghua University, Beijing, P. R. China;Network Research Center of Tsinghua University, Beijing, P. R. China;Network Research Center of Tsinghua University, Beijing, P. R. China

  • Venue:
  • ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part I
  • Year:
  • 2005

Quantified Score

Hi-index 0.01

Visualization

Abstract

In this paper, we aim to develop a systematic framework to semi-automate the process of system logs and databases of intrusion detection systems (IDS). We use both Ef-attribute based mining and Es-attribute based mining to mine effective and essential attributes (hence interesting patterns) from the vast and miscellaneous system logs and IDS databases.