An Effective Approach for Intrusion Detection using Web Mining Techniques

سال انتشار: 1395
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 409

فایل این مقاله در 5 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

BPJ02_020

تاریخ نمایه سازی: 11 آبان 1395

چکیده مقاله:

The Web and its Services are growing rapidly, so is the complexity and the number of cyber-attacks. Thus it is essential to use different security tools in order to protectcomputer systems and networks. Among these tools, Intrusion Detection Systems (IDSs) are one of the components of Defences-in-depth. One major drawback of IDSs is the generation of a huge number of alerts, most of which are false, redundant, or unimportant. Among different remedy approaches, many researchers proposed the use of data mining. Most of the research done in this area could not address the problems completely. Also, most of them suffer from human dependency and offline functionality. In this research, an online approach is proposed in order to manage alerts issued by IDSs. The proposed approach is able to process alerts produced byheterogeneous IDS systems. The approach is evaluated using DARPA 1999 dataset and Shahid Rajaee Port Complex dataset. Evaluation results show that the proposed approach can reduce the number of alerts by 94.32%, effectively improving alert management process. Because of the use of ensemble approach and optimal algorithms in the proposed approach, it can inform network security specialist the state of the monitored network in an online manner.

نویسندگان

Masoud Najjar Barghi

Department of Computer Engineering, Islamic Azad University, Zahedan Branch, Iran,

Javad Javad

Department of Computer Engineering, Islamic Azad University, Zahedan Branch, Iran,

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Agarwal, A, Johri, S., Agarwal, A., Tyagi, V. & Kumar, ...
  • _ _ _ _ Paper presented at the Proceedings of ...
  • _ _ Computer Virology, 6(1), 43-55. ...
  • _ _ _ Company, Fort Washington, Pemnsylvania. ...
  • Bace, R. & Mell, P. (2001). "NIST special publication on ...
  • Balthrop, J., Forrest, S. & Glickman, M. _ (2002). "Revisiting ...
  • Bloedorn, E., Christiansen, A. D., Hill, W., Skorupka, C, Tallot, ...
  • _ _ _ Retrieved 7/24/2013, from http : //neuro .bstu.by/ai/To- ...
  • Cheng-Yuan, H., Yuan-Cheng, L., Chen, I. W., Fu-Yu, W. & ...
  • Table _ report on additional metrics for evaluating the results ...
  • Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A. ...
  • Mohammed, R. G. & Awadelkarim, A. M. (2011). "Design and ...
  • Nessus. "Nessus Vulnerability Scanner". ...
  • /24/2013, from http :/www. tenab le. c om/pro ducts/nes sus ...
  • Okamoto, T. (2011). "An artificial intelligence membrane to detect network ...
  • CVE. "CVE _ Common Vulnerabilities and Exposures". Retrieved 7/24/2013, from ...
  • http : //www. _ , mit _ e du/m i ...
  • Denning, D. E. (1987). "An Intrusi on-TDetection Model". Software Engineering, ...
  • Dongre, S. S. & Wankhade, K. K. (2012). "Intrusion ...
  • _ _ _ 7/24/2013, from http ://www.sdl. sri , c ...
  • Mahoney, M. V. & Chan, P. K. (2003). "An Analysis ...
  • نمایش کامل مراجع