Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2007
DOI: 10.1145/1281192.1281267
|View full text |Cite
|
Sign up to set email alerts
|

Weighting versus pruning in rule validation for detecting network and host anomalies

Abstract: For intrusion detection, the LERAD algorithm learns a succinct set of comprehensible rules for detecting anomalies, which could be novel attacks. LERAD validates the learned rules on a separate held-out validation set and removes rules that cause false alarms. However, removing rules with possible high coverage can lead to missed detections. We propose to retain these rules and associate weights to them. We present three weighting schemes and our empirical results indicate that, for LERAD, rule weighting can d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 26 publications
0
10
0
Order By: Relevance
“…The other approach is association rule mining which finds the rules in a dataset using a list of transactions from the current databases [Mahoney and Chan, 2003] [ Qin and Hwang, 2004]. Anomaly detection methods based on association rule mining are applied in credit card fraud detection [Brause et al, 1999] and network security [Tandon and Chan, 2007].…”
Section: Rule-based Methodsmentioning
confidence: 99%
“…The other approach is association rule mining which finds the rules in a dataset using a list of transactions from the current databases [Mahoney and Chan, 2003] [ Qin and Hwang, 2004]. Anomaly detection methods based on association rule mining are applied in credit card fraud detection [Brause et al, 1999] and network security [Tandon and Chan, 2007].…”
Section: Rule-based Methodsmentioning
confidence: 99%
“…Some rule-extracting methods are user dependent and generated by an expert. Another approach is association rule mining, which finds the rules in a dataset by using a list of transactions in current databases [12,13]. Since the previous anomalous behaviors are defined perfectly as a set of rules, these methods are reliable for detecting previously known attacks.…”
Section: Rule-based Methodsmentioning
confidence: 99%
“…A similar approach is to use association rule mining algorithm for rule generation, which requires users to specify minimum support and confidence thresholds [30][31][32]. The advantage of this approach is that it utilizes the fact that outliers occur very rarely in the data, and can be dealt with by choosing appropriate support threshold to ensure that outliers are not taken into account in the process of rule generation.…”
Section: Rule-based Methodsmentioning
confidence: 99%