Nothing Special   »   [go: up one dir, main page]

Skip to main content

Anomaly Intrusion Detection Based on Dynamic Cluster Updating

  • Conference paper
Advances in Knowledge Discovery and Data Mining (PAKDD 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4426))

Included in the following conference series:

Abstract

For the effective detection of various intrusion methods into a computer, most of previous studies have been focused on the development of misuse-based intrusion detection methods. Recently, the works related to anomaly-based intrusion detection have attracted considerable attention because the anomaly detection technique can handle previously unknown intrusion methods effectively. However, most of them assume that the normal behavior of a user is fixed. Due to this reason, the new activities of the user may be regarded as anomalous events. In this paper, a new anomaly detection method based on an incremental clustering algorithm is proposed. To adaptively model the normal behavior of a user, the new profile of the user is effectively merged to the old one whenever new user transactions are added to the original data set.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Javitz, H.S., Valdes, A.: The NIDES Statistical Component Description and Justification. Annual report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025 (March 1994)

    Google Scholar 

  2. Porras, P.A., Neumann, P.G.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: 20th NISSC (October 1997)

    Google Scholar 

  3. Javitz, H.S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In: Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, May 1991, IEEE Computer Society Press, Los Alamitos (1991)

    Google Scholar 

  4. Ester, M., et al.: Incremental Clustering for Mining in a Data Warehousing Environment. In: Proceedings of the 24th VLDB Conference, New York, USA (1998)

    Google Scholar 

  5. Oh, S.-H., Lee, W.-S.: A Clustering-Based Anomaly Intrusion Detector for a Host Computer. IEICE Trans. on Information and Systems E87-D(8), 2086–2094 (2004)

    Google Scholar 

  6. Sun Microsystems. SunShield Basic Security Module Guide

    Google Scholar 

  7. http://www.ll.mit.edu/IST/ideval/index.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Zhi-Hua Zhou Hang Li Qiang Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Oh, SH., Lee, WS. (2007). Anomaly Intrusion Detection Based on Dynamic Cluster Updating. In: Zhou, ZH., Li, H., Yang, Q. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2007. Lecture Notes in Computer Science(), vol 4426. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71701-0_80

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71701-0_80

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71700-3

  • Online ISBN: 978-3-540-71701-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics