SlideShare une entreprise Scribd logo
1  sur  11
Télécharger pour lire hors ligne
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 1 ǁ Jan. 2015 ǁ PP.20-30
www.ijres.org 20 | Page
The Practical Data Mining Model for Efficient IDS through
Relational Databases
Dr. Mani Sarma Vittapu1
, Dr.Venkateswarlu Sunkari 2
and Ato Yoseph Abate3
1
Assistant Professor, Dept. of. ITSC, Addis Ababa Institute of Technology, AAU, Addis, Ethiopia.
2
Assistant Professor, Dept. of. ITSC, Addis Ababa Institute of Technology, AAU, Addis, Ethiopia.
3
HOD of ITSC, Addis Ababa Institute of Technology, AAU, Addis, Ethiopia.
Abstract: Enterprise network information system is not only the platform for information sharing and
information exchanging, but also the platform for enterprise production automation system and enterprise
management system working together. As a result, the security defense of enterprise network information
system does not only include information system network security and data security, but also include the
security of network business running on information system network, which is the confidentiality, integrity,
continuity and real-time of network business. Network security technology has become crucial in protecting
government and industry computing infrastructure. Modern intrusion detection applications face complex
requirements – they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent
years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good
generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant
challenges exist in the design and implementation of production quality IDSs. Incrementing components such as
data transformations, model deployment, and cooperative distributed detection remain a labor intensive and
complex engineering endeavor. This paper describes DAID, a database-centric architecture that leverages data
mining within the Relational RDBMS to address these challenges. DAID also offers numerous advantages in
terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability.
DAID is illustrated with an Intrusion Detection Center application prototype that leverages existing functionality
in Relational Database 10g. Intrusion detection system work at many levels in the network fabric and are taking
the concept of security to a whole new sphere by incorporating intelligence as a tool to protect networks against
un-authorized intrusions and newer forms of attack. We have described formal model for the construction of
network security situation measurement based on d-s evidence theory, frequent mode, and sequence model
extracted from the data on network security situation based on the knowledge found method and convert the
pattern on the related rules of the network security situation, and automatic generation of network security
situation.
Keywords: Intrusion Detection System (IDS), Data Mining, Network Security, DAID, Network Security
Situation (NSS), RDBMS.
I. Introduction
An intrusion detection system (IDS) is a device or software application that monitors network and/or
system activities for malicious activities or policy violations and produces reports to a management station. The
purpose of IDS is to detect and prevent electronic threat to computer systems. The extensive use of the
computers and availability of the Internet increase the impact of problem in size. In today’s world everyone is
connected over networks and many services are provided over the internet. Intrusion detection is an area
growing in relevance as more and more sensitive data are stored and processed in networked systems. An
intrusion detection system (IDS) monitors networked devices and looks for anomalous or malicious behavior in
the patterns of activity in the audit stream. A comprehensive IDS requires a significant amount of human
expertise and time for development. Data mining-based IDSs require less expert knowledge yet provide good
performance. These systems are also capable of generalizing to new and unknown attacks. Data mining-based
intrusion detection systems can be classified according to their detection strategy. There are two main strategies
misuse detection and anomaly detection. Misuse detection attempts to match observed activity to known
intrusion patterns. This is typically a classification problem. Anomaly detection attempts to identify behavior
that does not conform to normal behavior. This approach has a better chance of detecting novel attacks. IDSs
can also be distinguished on the basis of the audit data source (e.g., network-based, host-based). Successful
detection of different types of attacks typically requires a variety of audit data sources.
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 21 | Page
II. Basic approaches for intrusion detection system
Approaches for Intrusion detection systems can be broadly classified as: Signature based, Classification
based and Anomaly based.
2.1 Signature based (misuse detection) approach
Most of the commercial IDSs are “misuse detection systems” which are designed to detect only known
attacks. This approach uses a database of known attack signatures which is developed by experts and intrusion
analyst. The traffic over the network or sequence of processes within the computer is compared to the entries in
this database. If there is a match with database entries, the IDS system generates an alert message. Even though
such a system does not generate false positives alerts, these systems cannot identify new and novel attacks (Hu
Zhengbing et al., 2008; Ding et al., 2009).
There are two advantages of misuse detection approach:
It is very effective for detecting the attacks without generating an overwhelming number of false alarms and
it can quickly and reliably diagnose the use of a specific attack tool. On the other hand, the disadvantages of
misuse detection approach are: It can only detect those attacks that have been described in the database and the
database must be constantly updated with signatures of new attacks.
2.2 Classification-based intrusion detection approach
This approach uses normal and abnormal data sets of user behavior, and uses data mining techniques to
train the IDS system. This creates more accurate classification models for IDS as compared to signature-based
approaches and thus they are more powerful in detecting known attacks and their variants. Disadvantage of
classification-based intrusion detection approach: it is still not capable of detecting unknown attacks. This
approach uses normal and abnormal data sets of user behavior, and uses data mining techniques to train the IDS
system. This creates more accurate classification models for IDS as compared to signature-based approaches
and thus they are more powerful in detecting known attacks and their variants. Disadvantage of classification-
based intrusion detection approach: it is still not capable of detecting unknown attacks.
2.3 Anomaly intrusion detection approach
The basic assumption of anomaly detection approach is that attacks are different from normal activity and
thus they can be detected by IDS systems that identify these differences. Thus this approach begins with
definition of desired form or behavior of the system and then distinguishes between that desired behavior and
undesired or anomalous behavior. The main problem is, defining the boundary between acceptable and
anomalous behavior. So, the anomaly detector approach must be able to distinguish between the anomaly and
normal. There are 2 types of anomaly detectors: 1.Static anomaly detectors: It is based on the assumptions that
there is a portion of the system being monitored that should remain constant and 2. Dynamic anomaly detectors:
To characterize normal and acceptable behavior a base profile is created by a dynamic anomaly intrusion
system. Building the sufficiently accurate base profile is the main difficulty with the dynamic anomaly detection
system. The advantage of anomaly intrusion detection approach is: It is possible to detect unknown attacks. The
disadvantage of anomaly intrusion detection approach is: Produces a large number of false alarms due to the
unpredictable behaviors of users and networks. Therefore, large and accurate training data set is the major
requirement of anomaly detection approaches to define the normal behavior patterns. Building IDS is a complex
task of knowledge engineering that requires an elaborate infrastructure. An effective contemporary production-
quality IDS need an array of diverse components and features, including:
• Centralized view of the data
• Data transformation capabilities
• Analytic and data mining methods
• Flexible detector deployment, including scheduling that enables periodic model creation and distribution
• Real-time detection and alert infrastructure
• Reporting capabilities
• Distributed processing
• High system availability
• Scalability with system load
Recent proposals have highlighted the need for an architecture and framework specification for IDSs. While
these proposals provide a good foundation, they are somewhat general in nature and focus either on a
methodology specification that alleviates the knowledge engineering effort or on component interaction
specification (e.g., XML metadata). The details of the infrastructure required to support these feature-rich
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 22 | Page
complex frameworks are not provided, instead such details are proposed to be handled by the system engineers
responsible for the implementation. This paper demonstrates that the Relational Database, with its capabilities
for supporting mission critical applications, distributed processing, and integration of analytics, can be an
appropriate platform for an IDS implementation. Given the data-centric nature of the intrusion detection
process, leveraging existing RDBMS infrastructure can be both efficient and effective. The current paper
presents DAID (Database-centric Architecture for Intrusion Detection) for the Relational Database. This
RDBMS-centric framework can be used to build, manage, deploy, score, and analyze data mining-based
intrusion detection models. The described approach is adopted in the Intrusion Detection Center (IDC) prototype
– an application implemented using the capabilities of Relational Database. The paper is organized as follows.
Section 2 basic approaches to IDS. In section 3 describes proposed c architecture and the individual
components are described and illustrated with references to the IDC prototype and functionality available in the
Relational Database. Section 4 presents the conclusions and directions for future work.
III. A database-centric architecture
DAID (Figure 1) shares many aspects of the AMG (Adaptive Model Generation) architecture [8]. As in
AMG, a database component plays a key role in the architecture. Unlike AMG, where the database is only a
centralized data repository, in DAID, all major operations take place in the database itself. DAID also explicitly
addresses data transformations, an essential component in analytics. DAID has the following major components:
• Sensors
• Extraction, transformation and load (ETL)
• Centralized data warehousing
• Automated model generation
• Automated model distribution
• Real-time and offline detection
• Report and analysis
• Automated alerts
The activity in a computer network is monitored by an array of sensors producing a stream of audit data.
The audit data are processed and loaded in a centralized data repository (ETL). The stored data are used for
model generation. The model generation data mining methods are integrated in the database infrastructure – no
data movement is required. The generated intrusion detection models can undergo scheduled distribution and
deployment across different database instances. These models monitor the incoming audit data. The database
issues alerts when suspicious activity is detected. The models and the stored audit data can be also further
investigated using database reporting and analysis tools. The key aspect to the described data flow is that
processing is entirely contained within the database. With the exception of the sensor array, all other
components can be found in modern RDBMSs. Among the major benefits of using such an integrated approach
are improved security, speed, data management and access, and ease of implementation. The following
sections discuss and exemplify the functionality and usage of the individual components.
3.1. Sensors
A sensor is a system that collects audit information. Many types of audit streams can be used for detecting
intrusions examples include network traffic data, system logs on individual hosts, and system calls made by
processes. Network sensors typically filter and reassemble TCP/IP packets in order to extract high level
connection features (e.g., duration of connection, service, number of bytes transferred). A number of utilities
exist to assist the user in this data extraction process . Host sensors monitor system logs, CPU and memory
usage on a machine. In a distributed architecture, an emphasis is placed on creating lightweight sensors since
they are the only components that must run on the system that is being protected. DAID also favors a
lightweight sensor approach since all computation intensive tasks (e.g., feature extraction, model generation,
and detection) take place in the Relational RDBMS. In the IDC prototype, we simulate a network environment
by streaming previously collected network activity data. This dataset was originally created by DARPA and
later used in the KDD'99 Cup. The same dataset has already been successfully used for demonstrating the
capabilities of another intrusion detection framework .
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 23 | Page
Figure 1. Database-centric architecture for intrusion detection
3.2. ETL
Typically, sensor audit streams require further preprocessing and feature extraction before the data can be
successfully used for data mining model generation. For example, temporal statistical features of connections
and sessions have been found informative. Other more elaborate approaches (e.g., conceptual clustering) have
also shown promise . In the RDBMS context, SQL and user-defined functions offer a high degree of flexibility
and efficiency when extracting key pieces of information from the audit stream. Useful SQL capabilities include
math, aggregate, and analytic functions. For example, windowing functions can be used to compute aggregates
over time intervals or number of rows. The following query shows a windowing analytic function that computes
the number of http connections to a given host during the last 5 seconds:
SELECT count(*) OVER (ORDER BY time_stamp RANGE INTERVAL '5'
SECOND PRECEDING) as http_cnt FROM connection_data
WHERE dest_host = 'myhost'AND service = 'http';
The KDD’99 network activity data used in our study had already been suitably pre-processed. Therefore the
current version of the IDC prototype does not include feature extraction or other raw data transformations at the
processing ETL stage.
3.3. Data warehouse
Using the Relational database as a centralized data repository offers significant flexibility in terms of data
manipulation. Inputs from different sources can be combined through joins. Without replicating data, database
views or materialized views can capture different slices of the data (e.g., data over a given time interval, data for
a specific host). Such views can be used directly for model generation and data analysis. The Relational
database has the additional benefits of data security, high availability and load support, and fast response time.
3.4. Model generation Algorithms
Possible_attack_signature_algorithm:
Input: Attack signature database (ASDb)
Output: Possible attack signature database (PASDb)
Steps:
1. (Agarwal et al., 1993; Agarwal & Sant, 1994; Manila et al., 1994) Apply Apriori algorithm on feature data
warehouse to generate patterns set
2. For each Pattern in patterns set
a. For each Signature in Known Attack Signature set
i. Calculate Similarity between pattern and signature
ii. If (Similarity > 0.9)
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 24 | Page
1. Add pattern to possible attack signature
3. Stop
Known_attack_detection_algorithm:
Input: Network traffic feature, attack signature database
Output: Traffic classification (Norma/Attack)
Steps:
1. For each signature in known signature set
a. If(Traffic feature matches with signature)
i. Forward corresponding connection to intrusion prevention module
ii. Mark corresponding entry in feature data warehouse for attack
b. Else
i. Forward network traffic feature to possible attack signature detector
Possible_attack_detection_algorithm:
Input: Network traffic feature, possible attack signature database
Output: Traffic classification (Norma/Attack)
Steps:
1. For each signature in possible signature set
a. If(Traffic feature matches with signature)
i. Forward corresponding connection to honeypot module to detect intrusion
2. If (Result from honeypot is positive)
a. Remove corresponding signature entry from possible attack signature database
b. Add removed signature to known attack signature database
Else
c. Remove corresponding signature entry from possible attack signature database
3. Mark corresponding network traffic feature entry in feature data warehouse for attack.
Fig. 2. Model graph for SVM’s
3.5 SVM classifiers:
Support vector machines (SVM) are a set of related supervised learning methods that analyze data and
recognize patterns, used for classification and regression analysis. SVM delivers a unique solution, since the
optimality problem is convex. This is an advantage compared to neural networks, which have multiple solutions
associated with local minima and for this reason may not be robust over different samples. SVM are a set of
related supervised learning methods that analyze data and recognize patterns, used for classification and
regression analysis.
Table 1. Accuracy obtained using various machine learning methods.
Machine learning Methods Accuracy
Naïve bayesian 74
Bayesian network 99
Logistic regression 99.87
SVM 97.25
RBF network 97.98
Multilayer perception 99.85
SMO 99.55
KNN 99.92
Random Forest 99.97
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 25 | Page
A number of data mining techniques have been found useful in the context of misuse and anomaly
detection. Among the most popular techniques are association rules, clustering, support vector machines (SVM),
and decision trees. The Oracle 10g version of the Relational database offers robust and effective
implementations of data mining techniques that are fully integrated with core database functionality. The
incorporation of data mining eliminates the necessity of data export outside the database thus enhancing data
security. The model representation is native to the database and no special treatment is required to ensure
interoperability. In order to programmatically operationalize the model generation process, data mining
capabilities can be accessed via APIs (e.g., JDM standard Java API [9], PL/SQL data mining API ). Specialized
GUIs as entry points can be also easily developed, building upon the available API infrastructure (e.g.,
Relational Data Miner). Such GUI tools enable ad hoc data exploration and initial model investigation. The IDC
prototype leverages the dbms_data_mining PL/SQL package to instrument the model build functionality. We
train linear SVM anomaly and misuse detection models. SVM models have been shown to perform very well in
intrusion detection tasks. The intrusion detection dataset includes examples of normal behavior and four high-
level groups of attacks - probing, denial of service (dos), unauthorized access to local super user/root (u2r), and
unauthorized access from a remote machine (r2l). These four groups summarize 22 subclasses of attacks. The
test dataset includes 37 subclasses of attacks under the same four generic categories. We use the test data to
simulate the performance of the IDC prototype when operating in detection mode. For the misuse detection
problem, the SVM model was used to classify the network activity as normal or as belonging to one of the four
types of attack. The misuse classification results are summarized in Table 1. The overall accuracy of the system
was 92.1%. Applying the cost matrix from the KDD’99 competition, the model had a misclassification cost of
0.248. These results are competitive with KDD’99 published results . The poorer performance on the two rare
classes (u2r and especially r2l) is a common problem for this dataset and is attributed to differences in data
distribution between training and test data. For the anomaly detection problem, a one-class SVM model is used
to identify the network activity as normal or anomalous. Since anomaly detection does not rely on instances of
previous attacks, the one-class model was built on the subset of normal cases in the DARPA dataset. On the test
dataset, the model had excellent discrimination with an ROC area of 0.989. Sliding the probability decision
threshold allows trading-off the rate of true positives and false alarms – for example, in this model a true
positive rate of 96% corresponded to a false alarm rate of 5%.
Table 2. Confusion Matrix on DARPA Intrusion Detection Dataset (KDD’99 Competition)
Relational implementation of SVM is highly scalable [16]. Figure 2 depicts the build scalability of a linear
SVM misuse model with increasing number of records. The datasets of smaller size represent random samples
of the original intrusion detection data. Tests were run on a machine with the following hardware and software
specifications: single 3GHz i86 processor, 2GB RAM memory, and Red Hat enterprise Linux OS 3.0.
Figure 3. SVM build scalability
actualpred normal probe dos u2r r2l
Normal 59332 1048 45 57 111
Probe 602 3251 212 62 39
Dos 7393 88 222288 75 9
U2r 178 1 8 33 8
R21 14683 41 7 31 1427
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 26 | Page
The fast training times allow for frequent model rebuilds. In the IDC prototype, we schedule periodic model
updates as new data is accumulated. A model rebuild is also triggered when the performance accuracy falls
below a predefined level.
3.5. Model distribution
In DAID, model distribution is greatly simplified since models are not only stored in the database but are
also executed in it as well. Models are periodically updated by scheduling automatic builds. The newly
generated models are then automatically deployed to multiple database instances. Noel et al. [19] point out a
recent trend towards distributed intrusion detection systems where a single IDS monitors a number of network
nodes and the monitored information is transferred to a centralized site. Examples of distributed architectures
can be found in [26, 24, 23, 3]. IDSs implemented using a framework based on the Relational RDBMS can
transparently leverage Relational grid computing infrastructure – Real Application Clusters (RAC). Grids make
possible pooling of available servers, storage, and networks into a flexible on-demand computing resource
capable of achieving scalability and high availability [14, 4]. RAC allows a single Relational database to be
accessed by concurrent database instances running across a group of independent servers (nodes). The RAC
nodes share a single view of the distributed cache memory for the entire database. IDS built on top of RAC can
successfully leverage server load balancing (distribution of workload across nodes) and client load balancing
(distribution of new connections among nodes). Transparent application and connection failover mechanisms
are also available, thus ensuring uninterruptible system uptime. Figure 3 illustrates the architecture of an IDS
running on an Relational RAC system. Audit data are collected from Local Area Networks (LANs). The audit
data stream is monitored in one of the available database instances running on the Relational RAC nodes. In
addition to localized monitoring, the shared storage system allows pooling together of information from
different sources and enables detection of system-wide attack patterns. A grid-enabled RDBMS-based IDS
needs to be seamlessly integrated with a scheduling infrastructure. Such an infrastructure enables scheduling,
management, and monitoring of model build and deployment jobs. Although the IDC prototype has not yet been
deployed on a RAC system, we use Relational Scheduler – a scheduling system that meets the above
requirements – for management of the model build and deployment jobs.
3.6. Detection
Intrusion detection can be performed either real time or offline. An IDS typically handles large volumes of
streaming audit data. Real-time detection and alarm generation capabilities are critical for the instrumentation of
an effective system. ADAM [1] and MAIDS [2] are examples of data mining IDSs addressing issues in real-
time detection. In the context of DAID, an effective real-time detection mechanism can be implemented by
leveraging the parallelism and scalability of the Relational database. This removes the need for a system
developer to design and implement such infrastructure. Figure 1 shows detection as a separate entity. However,
inside the database, detection can be tightly integrated, through SQL, within the ETL process itself (indicated by
the dashed box in Figure 1). The following example demonstrates how this integration is achieved in the IDC
prototype. We make use of Relational Oracle10g Release 2 PREDICTION SQL operator. The audit data are
classified as attack or not by the misuse detection SVM model. The model scoring is part of a database INSERT
statement:
INSERT INTO attack_predictions (id, prediction) VALUES(10001,
PREDICTION( misuse_model USING 'tcp' AS protocol_type,'ftp' AS service, ... 'SF' AS flag, 27 AS
duration));
In addition to real-time detection, it is useful to perform offline scoring of stored audit data. This provides
an assessment of model performance, characterizes the type and volume of malicious activity, and assists in the
discovery of unusual patterns. Having detection cast as an SQL operator allows powerful database features to be
leveraged. In our prototype, we create a functional index on the probability of a case being an attack. The
following SQL code snippet shows the index creation statement:
CREATE INDEX attack_prob_idx ON audit_data
(PREDICTION_PROBABILITY( anomaly_model, 0 USING *));
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 27 | Page
Figure 3. Relational grid computing
We use the anomaly detection SVM model. The 0 argument indicates that the probability of an
anomaly/attack will be returned. Alternatively, a value of 1 would produce the probability of a connection being
normal. The * symbol maps the audit_data table columns to the list of predictors used during the model build.
The functional index optimizes query performance on the audit data table when filtering or sorting on
anomaly/attack probability is desired. The following query, which returns all cases in audit_data with
probability greater than 0.5 of being an attack, will have better performance if the attack_prob_idx index is used:
SELECT * FROM audit_data
WHERE PREDICTION_PROBABILITY( anomaly_model, 0 USING *) > 0.5;
Processing high volumes of streaming audit data requires a system capable of scoring large datasets in real
time. Figure 4 illustrates the PREDICTION operator’s scalability. The scalability results were generated using a
linear SVM misuse model built on 500,000 connection records. The same hardware was used as in the build
timing tests. The SQL PREDICTION operators also allow for the combination of multiple data mining models
that are scored either serially or in parallel, thus enabling hierarchical and cooperative detection approaches.
Models can be built on different types of audit data or different timeframes, can have different scope (localized
vs. global detectors), and can use different data mining algorithms. The combination of multiple models and
techniques has been found to be a key requirement for a successful data mining-based IDS . The next example
shows a hypothetical use case where two models perform parallel cooperative detection. The query returns all
cases where either model1 or model2 indicate an attack with probability higher than 0.4:
SELECT * FROM audit_data
WHERE PREDICTION_PROBABILITY( model1, 'attack' USING *) > 0.4
OR PREDICTION_PROBABILITY( model2, 'attack' USING *) > 0.4;
SELECT * FROM audit_data WHERE PREDICTION_PROBABILITY( model1, 'attack' USING *) > 0.4
OR PREDICTION_PROBABILITY( model2, 'attack' USING *) > 0.4;
SELECT id, PREDICTION( misuse_model USING *) FROM audit_data
WHERE PREDICTION_PROBABILITY( anomaly_model, 0 USING *) > 0.5;
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 28 | Page
Figure 4. Prediction scalability
In the current IDC prototype, the misuse and anomaly detection models are scored independently. We plan
on extending the IDC implementation with sequential (or “pipelined”) cooperative detection, where the results
of one model influence the predictions of another model. In this case, when the anomaly model classifies a case
as an attack with probability greater than 0.5, the misuse model will attempt to identify the type of attack:
2.7. Alerts
Upon detection of malicious or anomalous activity, an IDS needs to generate an alarm, notify interested
parties, and possibly initiate a response. Such a requirement can be easily met by employing existing Relational
database infrastructure. Database triggers are powerful SQL mechanisms that initiate a predefined action when a
specific condition is met. The following statement shows the trigger definition used in the IDC prototype where
an attack results in posting a message in a queue for handling attack notifications:
CREATE TRIGGER alert_trg BEFORE INSERT ON attack_predictions
FOR EACH ROW WHEN (new.prediction <> 'normal')
BEGIN DBMS_AQ.ENQUEUE( 'attack_notify_queue', ...); END;
The IDC prototype uses Relational Oracle 10g Publish-Subscribe messaging infrastructure (DBMS_AQ
PL/SQL package). We chose Publish-Subscribe as the messaging approach since it handles well asynchronous
communications in distributed systems that operate in a loosely-coupled and autonomous fashion and which
require operational immunity from network failures. The detectors act as publishers who send alerts without
explicitly specifying recipients. The subscribers (users/applications) receive only messages that they have
registered an interest in. The decoupling of senders and receivers is achieved via a queuing mechanism. Each
queue represents a subject or a channel. Active publication of information to end users in an event-driven
manner complements the more traditional pull-oriented approaches to accessing information that are also
available in Relational. IDS alert scan be also delivered via a diverse range of channels (e.g., e-mails, cell phone
messages). In the IDC prototype, an Relational Application server Portal-based application – the Intrusion
Detection Center dashboard – monitors the state of the network and displays relevant information. One of the
tasks of the IDC dashboard is to monitor the alert queue alert notifications. Figure 5 shows a screenshot of the
IDC dashboard. The alert notification information includes the type of attack (based on them issued model
prediction) and some of the important connection details.
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 29 | Page
Figure 5. IDC dashboard
3.8. Reports and analysis
Using the database as the platform for IDS implementation facilitates the generation of data analysis results
and reports. Collected audit data, detection predictions, as well as model contents, can be inspected either
directly using queries or via higher level reporting and visualization tools (e.g., Discoverer, Relational Reports).
This allows circumvention of a lengthy application development process and provides a standardized and easily
customized Report generation and delivery mechanism. The IDC dashboard leverages the tools available in
Relational Portal to instrument a network activity reporting and analysis mechanism. On the main page (Figure
5), users can monitor:
• Number of intrusion attempts during the past 24 hours (top left panel)
• Breakdown of the network activity into normal and specific types of attack (top center panel)
• Detector error rate over the last 7 days (top right panel)
• Log of recent alerts (bottom panel)
Figure 6. IDC detail statistics
On the details page (Figure 6), users can review historic data. When a date is selected in the top left panel,
the graphs are updated with the corresponding network activity information. The bottom left panel displays the
breakdown of network activity into normal and specific types of attack for the selected date. The middle panels
show the distribution of connection activity over different types of protocol, service, etc. Clicking on any of the
bars produces a breakdown of the network activity (normal and types of attack) for this particular value. For
example, in Figure 5 the top right panel shows the breakdown of activity for the tcp protocol for the selected
date.
IV. Conclusion and Future Scope
This paper reviews and tried to summarize different types, methods and approaches for intrusion detection
system and also provides a strong platform to detect anomalies. Database-centric IDSs offer many advantages
over alternative systems. These include tight integration of individual components, security, scalability, and high
availability. The proposed model is in its initial stage where an initial algorithm is proposed. Current trends in
RDBMSs are moving towards providing all key components for delivering comprehensive state-of-the-art IDSs.
The Practical Data Mining Model for Efficient IDS through Relational Databases
www.ijres.org 30 | Page
As illustrated above, Relational Database 10g Release 2 already incorporates these key functionality elements.
By leveraging the existing technology stack, a full-fledged IDS can be developed in a reasonably short time-
frame and at low development cost. The similarities between real-time intrusion detection and real-time fraud
detection (e.g., credit-card fraud, e-commerce fraud) suggest that DAID could be also applicable to these types
of applications. This will be investigated in a future work. We also plan to extend the IDC prototype to take
advantage of RAC and sensor data preprocessing at the ETL stage.
Reference
[1] Mukkamala, S., Janoski, G., and Sung, A., Intrusion Detection Using Neural Networks and Support Vector Machines, In Proc. of
IEEE International Joint Conference on Neural Networks, IEEE Press, 2002, pp. 1702-1707.
[2] Hu, W., Liao, Y., and Vemuri, V. R., Robust Support Vector Machines for Anomaly Detection in Computer Security, In Proc.
International Conference on Machine Learning and Applications, 2003, pp. 168-174.
[3] Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu,N., ADAM: A Testbed for Exploring the Use of Data Mining in
Intrusion Detection, ACM SIGMOD Record, 30(4), 2001, pp. 15-24.
[4] DataDirect Technologies, Using Oracle Real Application Clusters (RAC),
http://www.datadirect.com/techzone/odbc/docs/odbc_oracle_rac.pdf, 2004.
[5] DBMS_DATA_MINING PL/SQL package, Oracle10g PL/SQL packages and types reference, Ch. 23, Oracle Corporation, 2003.
[6] Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo, S. J., A Geometric Framework for Unsupervised Anomaly Detection:
Detecting Intrusions in Unlabeled Data, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security,
Kluwer Academic Publishers, Boston, MA, 2002, pp. 78-99.
[7] Zhang, Y., Lee, W., and Huang, Y.-A., Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks, 9(5),
2003, pp. 545-556.
[8] Youssif Al-Nashif, Aarthi Arun Kumar, Salim Hariri,Guangzhi Qu, Yi Luo and Ferenc Szidarovsky (2008) Multi-Level intrusion
detection system. IEEE, Intl. Conf. on Automonic Computing. pp:131-140.
[9] Sangeetha S, Vaidehi V, Srinivasan N, Rajkumar KV, Pradeep S, Ragavan N, Sri Sai Lokesh C,Subadeepak I and Prashanth V
(2008) Implementation of application layer intrusion detection system using protocol analysis. IEEE-Intl Conf. on Signal
processing, Commun. & Networking .pp:279-284.
[10] Ya-Li Ding, Lei Li and Hong-Qi Luo (2009) A novel signature searching for intrusion detection system using data mining. IEEE
8th Intl. Conf. on Machine Learning & Cybernetics. ISBN: 978-1-4244-3703-0.pp:122-126.
[11] Lu Huijuan, Chen Jianguo and d Wei Wei (2008) Two stratum Bayesian network based anomaly detection model for intrusion
detection system. IEEE, Intl. Symp. on Electronic Commerce & Security.pp:482-487.
[12] Su MY, Chang KC, Wei HF and Lin CY (2008) A real-time network intrusion detection system based on incremental mining
approach. IEEE.pp: 76- 81.
[13] Joong-Hee Leet, Jong-Hyouk Leet, Seon-Gyoung Sohn, Jong-Ho Ryu, and Tai-Myoung Chungt (2008) Effective value of
decision tree with KDD 99 intrusion detection datasets for intrusion detection system.IEEE, ISBN: 978-89-5519-136-3.
[14] G. Silo wash, D. Cappelli, A. Moore, R. Trzeciak, T. Shim all, and L. Flynn, “Common sense guide to mitigating insider threats,
4th edition,” Software Engineering Institute, Carnegie Mellon University, Tech.Rep. CMU/SEI-2012-TR-012, 2012.
[15] M. Salem, S. Hers kop, and S. Stolfo, “A survey of insider attack detection research,” Insider Attack and Cyber Security, pp. 69–
90, 2008.
[16] http://www.academia.edu/4052668/Computer_and_Network_Security_Threats
[17] http://www.clico.pl/services/Principles_Network_Security_Design.pdf
[18] http://www.interhack.net/pubs/network-security.pdf
[19] http://www.potaroo.net/t4/pdf/security.pdf
[20] http://web.mit.edu/~bdaya/www/Network%20Security.pdf
[21] http://web.mit.edu/~bdaya/www/Network%20Security.pdf
[22] C. Thomas and N. Balakrishnan, “Issues and Challenges in Intrusion Detection with Skewed Network Traffic,” 2013.
[23] M. O. Pervaiz, M. Cardei, and J. Wu, “Routing security in ad hoc wireless networks,” in Network Security, Springer, 2010, pp.
117–142.
[24] M. Hall, E. Frank, G. Holmes, B. Pfahringer,P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update,”
ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10–18, 2009.
[25] James Hoagland, “The Teredo Protocol Tunneling Past Network Security and Other Security Implications - Google Search,”
Symantec Advanced Threat Research, United States, 2006.

Contenu connexe

Tendances

IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...IJAAS Team
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...IJNSA Journal
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...IJNSA Journal
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM ijwmn
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkIOSR Journals
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueIRJET Journal
 
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemQuery Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemSimran Seth
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...IJCSIS Research Publications
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETIJNSA Journal
 
D0261019025
D0261019025D0261019025
D0261019025theijes
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIJERA Editor
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...Alexander Decker
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...Alexander Decker
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 

Tendances (18)

IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...Data Mining Techniques for Providing Network Security through Intrusion Detec...
Data Mining Techniques for Providing Network Security through Intrusion Detec...
 
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
A PROPOSED MODEL FOR DIMENSIONALITY REDUCTION TO IMPROVE THE CLASSIFICATION C...
 
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
E1802052327
E1802052327E1802052327
E1802052327
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection SystemQuery Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
 
J1802056063
J1802056063J1802056063
J1802056063
 
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
Enhanced Intrusion Detection System using Feature Selection Method and Ensemb...
 
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SETCLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
CLASSIFICATION PROCEDURES FOR INTRUSION DETECTION BASED ON KDD CUP 99 DATA SET
 
D0261019025
D0261019025D0261019025
D0261019025
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
Intrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring SystemIntrusion Detection System: Security Monitoring System
Intrusion Detection System: Security Monitoring System
 
11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...11.a genetic algorithm based elucidation for improving intrusion detection th...
11.a genetic algorithm based elucidation for improving intrusion detection th...
 
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
1.[1 9]a genetic algorithm based elucidation for improving intrusion detectio...
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 

En vedette

En vedette (11)

A Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining PresentationA Practical Approach To Data Mining Presentation
A Practical Approach To Data Mining Presentation
 
Data Mining the City - A (practical) introduction to Machine Learning
Data Mining the City - A (practical) introduction to Machine LearningData Mining the City - A (practical) introduction to Machine Learning
Data Mining the City - A (practical) introduction to Machine Learning
 
RapidMiner: Data Mining And Rapid Miner
RapidMiner:  Data Mining And Rapid MinerRapidMiner:  Data Mining And Rapid Miner
RapidMiner: Data Mining And Rapid Miner
 
Data Mining and Machine Learning
Data Mining and Machine LearningData Mining and Machine Learning
Data Mining and Machine Learning
 
Practical Data Mining: FP-Growth
Practical Data Mining: FP-GrowthPractical Data Mining: FP-Growth
Practical Data Mining: FP-Growth
 
Practical Data Mining with RapidMiner Studio 7 : A Basic and Intermediate
Practical Data Mining with RapidMiner Studio 7 : A Basic and IntermediatePractical Data Mining with RapidMiner Studio 7 : A Basic and Intermediate
Practical Data Mining with RapidMiner Studio 7 : A Basic and Intermediate
 
Introduction data mining
Introduction data miningIntroduction data mining
Introduction data mining
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Data mining
Data miningData mining
Data mining
 
Data mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniquesData mining (lecture 1 & 2) conecpts and techniques
Data mining (lecture 1 & 2) conecpts and techniques
 

Similaire à The Practical Data Mining Model for Efficient IDS through Relational Databases

Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSieijjournal1
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesKelly Taylor
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Drjabez
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logicijdpsjournal
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique IRJET Journal
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...IJORCS
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 

Similaire à The Practical Data Mining Model for Efficient IDS through Relational Databases (20)

Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMSAN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
M0446772
M0446772M0446772
M0446772
 
Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)Articles - International Journal of Network Security & Its Applications (IJNSA)
Articles - International Journal of Network Security & Its Applications (IJNSA)
 
A Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And TechniquesA Comprehensive Review On Intrusion Detection System And Techniques
A Comprehensive Review On Intrusion Detection System And Techniques
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection A...
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy LogicCurrent Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
 
Survey of Clustering Based Detection using IDS Technique
Survey of Clustering Based Detection using   IDS Technique Survey of Clustering Based Detection using   IDS Technique
Survey of Clustering Based Detection using IDS Technique
 
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
 
C3602021025
C3602021025C3602021025
C3602021025
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 

Plus de IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

Plus de IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Dernier

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

The Practical Data Mining Model for Efficient IDS through Relational Databases

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 3 Issue 1 ǁ Jan. 2015 ǁ PP.20-30 www.ijres.org 20 | Page The Practical Data Mining Model for Efficient IDS through Relational Databases Dr. Mani Sarma Vittapu1 , Dr.Venkateswarlu Sunkari 2 and Ato Yoseph Abate3 1 Assistant Professor, Dept. of. ITSC, Addis Ababa Institute of Technology, AAU, Addis, Ethiopia. 2 Assistant Professor, Dept. of. ITSC, Addis Ababa Institute of Technology, AAU, Addis, Ethiopia. 3 HOD of ITSC, Addis Ababa Institute of Technology, AAU, Addis, Ethiopia. Abstract: Enterprise network information system is not only the platform for information sharing and information exchanging, but also the platform for enterprise production automation system and enterprise management system working together. As a result, the security defense of enterprise network information system does not only include information system network security and data security, but also include the security of network business running on information system network, which is the confidentiality, integrity, continuity and real-time of network business. Network security technology has become crucial in protecting government and industry computing infrastructure. Modern intrusion detection applications face complex requirements – they need to be reliable, extensible, easy to manage, and have low maintenance cost. In recent years, data mining-based intrusion detection systems (IDSs) have demonstrated high accuracy, good generalization to novel types of intrusion, and robust behavior in a changing environment. Still, significant challenges exist in the design and implementation of production quality IDSs. Incrementing components such as data transformations, model deployment, and cooperative distributed detection remain a labor intensive and complex engineering endeavor. This paper describes DAID, a database-centric architecture that leverages data mining within the Relational RDBMS to address these challenges. DAID also offers numerous advantages in terms of scheduling capabilities, alert infrastructure, data analysis tools, security, scalability, and reliability. DAID is illustrated with an Intrusion Detection Center application prototype that leverages existing functionality in Relational Database 10g. Intrusion detection system work at many levels in the network fabric and are taking the concept of security to a whole new sphere by incorporating intelligence as a tool to protect networks against un-authorized intrusions and newer forms of attack. We have described formal model for the construction of network security situation measurement based on d-s evidence theory, frequent mode, and sequence model extracted from the data on network security situation based on the knowledge found method and convert the pattern on the related rules of the network security situation, and automatic generation of network security situation. Keywords: Intrusion Detection System (IDS), Data Mining, Network Security, DAID, Network Security Situation (NSS), RDBMS. I. Introduction An intrusion detection system (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a management station. The purpose of IDS is to detect and prevent electronic threat to computer systems. The extensive use of the computers and availability of the Internet increase the impact of problem in size. In today’s world everyone is connected over networks and many services are provided over the internet. Intrusion detection is an area growing in relevance as more and more sensitive data are stored and processed in networked systems. An intrusion detection system (IDS) monitors networked devices and looks for anomalous or malicious behavior in the patterns of activity in the audit stream. A comprehensive IDS requires a significant amount of human expertise and time for development. Data mining-based IDSs require less expert knowledge yet provide good performance. These systems are also capable of generalizing to new and unknown attacks. Data mining-based intrusion detection systems can be classified according to their detection strategy. There are two main strategies misuse detection and anomaly detection. Misuse detection attempts to match observed activity to known intrusion patterns. This is typically a classification problem. Anomaly detection attempts to identify behavior that does not conform to normal behavior. This approach has a better chance of detecting novel attacks. IDSs can also be distinguished on the basis of the audit data source (e.g., network-based, host-based). Successful detection of different types of attacks typically requires a variety of audit data sources.
  • 2. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 21 | Page II. Basic approaches for intrusion detection system Approaches for Intrusion detection systems can be broadly classified as: Signature based, Classification based and Anomaly based. 2.1 Signature based (misuse detection) approach Most of the commercial IDSs are “misuse detection systems” which are designed to detect only known attacks. This approach uses a database of known attack signatures which is developed by experts and intrusion analyst. The traffic over the network or sequence of processes within the computer is compared to the entries in this database. If there is a match with database entries, the IDS system generates an alert message. Even though such a system does not generate false positives alerts, these systems cannot identify new and novel attacks (Hu Zhengbing et al., 2008; Ding et al., 2009). There are two advantages of misuse detection approach: It is very effective for detecting the attacks without generating an overwhelming number of false alarms and it can quickly and reliably diagnose the use of a specific attack tool. On the other hand, the disadvantages of misuse detection approach are: It can only detect those attacks that have been described in the database and the database must be constantly updated with signatures of new attacks. 2.2 Classification-based intrusion detection approach This approach uses normal and abnormal data sets of user behavior, and uses data mining techniques to train the IDS system. This creates more accurate classification models for IDS as compared to signature-based approaches and thus they are more powerful in detecting known attacks and their variants. Disadvantage of classification-based intrusion detection approach: it is still not capable of detecting unknown attacks. This approach uses normal and abnormal data sets of user behavior, and uses data mining techniques to train the IDS system. This creates more accurate classification models for IDS as compared to signature-based approaches and thus they are more powerful in detecting known attacks and their variants. Disadvantage of classification- based intrusion detection approach: it is still not capable of detecting unknown attacks. 2.3 Anomaly intrusion detection approach The basic assumption of anomaly detection approach is that attacks are different from normal activity and thus they can be detected by IDS systems that identify these differences. Thus this approach begins with definition of desired form or behavior of the system and then distinguishes between that desired behavior and undesired or anomalous behavior. The main problem is, defining the boundary between acceptable and anomalous behavior. So, the anomaly detector approach must be able to distinguish between the anomaly and normal. There are 2 types of anomaly detectors: 1.Static anomaly detectors: It is based on the assumptions that there is a portion of the system being monitored that should remain constant and 2. Dynamic anomaly detectors: To characterize normal and acceptable behavior a base profile is created by a dynamic anomaly intrusion system. Building the sufficiently accurate base profile is the main difficulty with the dynamic anomaly detection system. The advantage of anomaly intrusion detection approach is: It is possible to detect unknown attacks. The disadvantage of anomaly intrusion detection approach is: Produces a large number of false alarms due to the unpredictable behaviors of users and networks. Therefore, large and accurate training data set is the major requirement of anomaly detection approaches to define the normal behavior patterns. Building IDS is a complex task of knowledge engineering that requires an elaborate infrastructure. An effective contemporary production- quality IDS need an array of diverse components and features, including: • Centralized view of the data • Data transformation capabilities • Analytic and data mining methods • Flexible detector deployment, including scheduling that enables periodic model creation and distribution • Real-time detection and alert infrastructure • Reporting capabilities • Distributed processing • High system availability • Scalability with system load Recent proposals have highlighted the need for an architecture and framework specification for IDSs. While these proposals provide a good foundation, they are somewhat general in nature and focus either on a methodology specification that alleviates the knowledge engineering effort or on component interaction specification (e.g., XML metadata). The details of the infrastructure required to support these feature-rich
  • 3. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 22 | Page complex frameworks are not provided, instead such details are proposed to be handled by the system engineers responsible for the implementation. This paper demonstrates that the Relational Database, with its capabilities for supporting mission critical applications, distributed processing, and integration of analytics, can be an appropriate platform for an IDS implementation. Given the data-centric nature of the intrusion detection process, leveraging existing RDBMS infrastructure can be both efficient and effective. The current paper presents DAID (Database-centric Architecture for Intrusion Detection) for the Relational Database. This RDBMS-centric framework can be used to build, manage, deploy, score, and analyze data mining-based intrusion detection models. The described approach is adopted in the Intrusion Detection Center (IDC) prototype – an application implemented using the capabilities of Relational Database. The paper is organized as follows. Section 2 basic approaches to IDS. In section 3 describes proposed c architecture and the individual components are described and illustrated with references to the IDC prototype and functionality available in the Relational Database. Section 4 presents the conclusions and directions for future work. III. A database-centric architecture DAID (Figure 1) shares many aspects of the AMG (Adaptive Model Generation) architecture [8]. As in AMG, a database component plays a key role in the architecture. Unlike AMG, where the database is only a centralized data repository, in DAID, all major operations take place in the database itself. DAID also explicitly addresses data transformations, an essential component in analytics. DAID has the following major components: • Sensors • Extraction, transformation and load (ETL) • Centralized data warehousing • Automated model generation • Automated model distribution • Real-time and offline detection • Report and analysis • Automated alerts The activity in a computer network is monitored by an array of sensors producing a stream of audit data. The audit data are processed and loaded in a centralized data repository (ETL). The stored data are used for model generation. The model generation data mining methods are integrated in the database infrastructure – no data movement is required. The generated intrusion detection models can undergo scheduled distribution and deployment across different database instances. These models monitor the incoming audit data. The database issues alerts when suspicious activity is detected. The models and the stored audit data can be also further investigated using database reporting and analysis tools. The key aspect to the described data flow is that processing is entirely contained within the database. With the exception of the sensor array, all other components can be found in modern RDBMSs. Among the major benefits of using such an integrated approach are improved security, speed, data management and access, and ease of implementation. The following sections discuss and exemplify the functionality and usage of the individual components. 3.1. Sensors A sensor is a system that collects audit information. Many types of audit streams can be used for detecting intrusions examples include network traffic data, system logs on individual hosts, and system calls made by processes. Network sensors typically filter and reassemble TCP/IP packets in order to extract high level connection features (e.g., duration of connection, service, number of bytes transferred). A number of utilities exist to assist the user in this data extraction process . Host sensors monitor system logs, CPU and memory usage on a machine. In a distributed architecture, an emphasis is placed on creating lightweight sensors since they are the only components that must run on the system that is being protected. DAID also favors a lightweight sensor approach since all computation intensive tasks (e.g., feature extraction, model generation, and detection) take place in the Relational RDBMS. In the IDC prototype, we simulate a network environment by streaming previously collected network activity data. This dataset was originally created by DARPA and later used in the KDD'99 Cup. The same dataset has already been successfully used for demonstrating the capabilities of another intrusion detection framework .
  • 4. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 23 | Page Figure 1. Database-centric architecture for intrusion detection 3.2. ETL Typically, sensor audit streams require further preprocessing and feature extraction before the data can be successfully used for data mining model generation. For example, temporal statistical features of connections and sessions have been found informative. Other more elaborate approaches (e.g., conceptual clustering) have also shown promise . In the RDBMS context, SQL and user-defined functions offer a high degree of flexibility and efficiency when extracting key pieces of information from the audit stream. Useful SQL capabilities include math, aggregate, and analytic functions. For example, windowing functions can be used to compute aggregates over time intervals or number of rows. The following query shows a windowing analytic function that computes the number of http connections to a given host during the last 5 seconds: SELECT count(*) OVER (ORDER BY time_stamp RANGE INTERVAL '5' SECOND PRECEDING) as http_cnt FROM connection_data WHERE dest_host = 'myhost'AND service = 'http'; The KDD’99 network activity data used in our study had already been suitably pre-processed. Therefore the current version of the IDC prototype does not include feature extraction or other raw data transformations at the processing ETL stage. 3.3. Data warehouse Using the Relational database as a centralized data repository offers significant flexibility in terms of data manipulation. Inputs from different sources can be combined through joins. Without replicating data, database views or materialized views can capture different slices of the data (e.g., data over a given time interval, data for a specific host). Such views can be used directly for model generation and data analysis. The Relational database has the additional benefits of data security, high availability and load support, and fast response time. 3.4. Model generation Algorithms Possible_attack_signature_algorithm: Input: Attack signature database (ASDb) Output: Possible attack signature database (PASDb) Steps: 1. (Agarwal et al., 1993; Agarwal & Sant, 1994; Manila et al., 1994) Apply Apriori algorithm on feature data warehouse to generate patterns set 2. For each Pattern in patterns set a. For each Signature in Known Attack Signature set i. Calculate Similarity between pattern and signature ii. If (Similarity > 0.9)
  • 5. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 24 | Page 1. Add pattern to possible attack signature 3. Stop Known_attack_detection_algorithm: Input: Network traffic feature, attack signature database Output: Traffic classification (Norma/Attack) Steps: 1. For each signature in known signature set a. If(Traffic feature matches with signature) i. Forward corresponding connection to intrusion prevention module ii. Mark corresponding entry in feature data warehouse for attack b. Else i. Forward network traffic feature to possible attack signature detector Possible_attack_detection_algorithm: Input: Network traffic feature, possible attack signature database Output: Traffic classification (Norma/Attack) Steps: 1. For each signature in possible signature set a. If(Traffic feature matches with signature) i. Forward corresponding connection to honeypot module to detect intrusion 2. If (Result from honeypot is positive) a. Remove corresponding signature entry from possible attack signature database b. Add removed signature to known attack signature database Else c. Remove corresponding signature entry from possible attack signature database 3. Mark corresponding network traffic feature entry in feature data warehouse for attack. Fig. 2. Model graph for SVM’s 3.5 SVM classifiers: Support vector machines (SVM) are a set of related supervised learning methods that analyze data and recognize patterns, used for classification and regression analysis. SVM delivers a unique solution, since the optimality problem is convex. This is an advantage compared to neural networks, which have multiple solutions associated with local minima and for this reason may not be robust over different samples. SVM are a set of related supervised learning methods that analyze data and recognize patterns, used for classification and regression analysis. Table 1. Accuracy obtained using various machine learning methods. Machine learning Methods Accuracy Naïve bayesian 74 Bayesian network 99 Logistic regression 99.87 SVM 97.25 RBF network 97.98 Multilayer perception 99.85 SMO 99.55 KNN 99.92 Random Forest 99.97
  • 6. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 25 | Page A number of data mining techniques have been found useful in the context of misuse and anomaly detection. Among the most popular techniques are association rules, clustering, support vector machines (SVM), and decision trees. The Oracle 10g version of the Relational database offers robust and effective implementations of data mining techniques that are fully integrated with core database functionality. The incorporation of data mining eliminates the necessity of data export outside the database thus enhancing data security. The model representation is native to the database and no special treatment is required to ensure interoperability. In order to programmatically operationalize the model generation process, data mining capabilities can be accessed via APIs (e.g., JDM standard Java API [9], PL/SQL data mining API ). Specialized GUIs as entry points can be also easily developed, building upon the available API infrastructure (e.g., Relational Data Miner). Such GUI tools enable ad hoc data exploration and initial model investigation. The IDC prototype leverages the dbms_data_mining PL/SQL package to instrument the model build functionality. We train linear SVM anomaly and misuse detection models. SVM models have been shown to perform very well in intrusion detection tasks. The intrusion detection dataset includes examples of normal behavior and four high- level groups of attacks - probing, denial of service (dos), unauthorized access to local super user/root (u2r), and unauthorized access from a remote machine (r2l). These four groups summarize 22 subclasses of attacks. The test dataset includes 37 subclasses of attacks under the same four generic categories. We use the test data to simulate the performance of the IDC prototype when operating in detection mode. For the misuse detection problem, the SVM model was used to classify the network activity as normal or as belonging to one of the four types of attack. The misuse classification results are summarized in Table 1. The overall accuracy of the system was 92.1%. Applying the cost matrix from the KDD’99 competition, the model had a misclassification cost of 0.248. These results are competitive with KDD’99 published results . The poorer performance on the two rare classes (u2r and especially r2l) is a common problem for this dataset and is attributed to differences in data distribution between training and test data. For the anomaly detection problem, a one-class SVM model is used to identify the network activity as normal or anomalous. Since anomaly detection does not rely on instances of previous attacks, the one-class model was built on the subset of normal cases in the DARPA dataset. On the test dataset, the model had excellent discrimination with an ROC area of 0.989. Sliding the probability decision threshold allows trading-off the rate of true positives and false alarms – for example, in this model a true positive rate of 96% corresponded to a false alarm rate of 5%. Table 2. Confusion Matrix on DARPA Intrusion Detection Dataset (KDD’99 Competition) Relational implementation of SVM is highly scalable [16]. Figure 2 depicts the build scalability of a linear SVM misuse model with increasing number of records. The datasets of smaller size represent random samples of the original intrusion detection data. Tests were run on a machine with the following hardware and software specifications: single 3GHz i86 processor, 2GB RAM memory, and Red Hat enterprise Linux OS 3.0. Figure 3. SVM build scalability actualpred normal probe dos u2r r2l Normal 59332 1048 45 57 111 Probe 602 3251 212 62 39 Dos 7393 88 222288 75 9 U2r 178 1 8 33 8 R21 14683 41 7 31 1427
  • 7. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 26 | Page The fast training times allow for frequent model rebuilds. In the IDC prototype, we schedule periodic model updates as new data is accumulated. A model rebuild is also triggered when the performance accuracy falls below a predefined level. 3.5. Model distribution In DAID, model distribution is greatly simplified since models are not only stored in the database but are also executed in it as well. Models are periodically updated by scheduling automatic builds. The newly generated models are then automatically deployed to multiple database instances. Noel et al. [19] point out a recent trend towards distributed intrusion detection systems where a single IDS monitors a number of network nodes and the monitored information is transferred to a centralized site. Examples of distributed architectures can be found in [26, 24, 23, 3]. IDSs implemented using a framework based on the Relational RDBMS can transparently leverage Relational grid computing infrastructure – Real Application Clusters (RAC). Grids make possible pooling of available servers, storage, and networks into a flexible on-demand computing resource capable of achieving scalability and high availability [14, 4]. RAC allows a single Relational database to be accessed by concurrent database instances running across a group of independent servers (nodes). The RAC nodes share a single view of the distributed cache memory for the entire database. IDS built on top of RAC can successfully leverage server load balancing (distribution of workload across nodes) and client load balancing (distribution of new connections among nodes). Transparent application and connection failover mechanisms are also available, thus ensuring uninterruptible system uptime. Figure 3 illustrates the architecture of an IDS running on an Relational RAC system. Audit data are collected from Local Area Networks (LANs). The audit data stream is monitored in one of the available database instances running on the Relational RAC nodes. In addition to localized monitoring, the shared storage system allows pooling together of information from different sources and enables detection of system-wide attack patterns. A grid-enabled RDBMS-based IDS needs to be seamlessly integrated with a scheduling infrastructure. Such an infrastructure enables scheduling, management, and monitoring of model build and deployment jobs. Although the IDC prototype has not yet been deployed on a RAC system, we use Relational Scheduler – a scheduling system that meets the above requirements – for management of the model build and deployment jobs. 3.6. Detection Intrusion detection can be performed either real time or offline. An IDS typically handles large volumes of streaming audit data. Real-time detection and alarm generation capabilities are critical for the instrumentation of an effective system. ADAM [1] and MAIDS [2] are examples of data mining IDSs addressing issues in real- time detection. In the context of DAID, an effective real-time detection mechanism can be implemented by leveraging the parallelism and scalability of the Relational database. This removes the need for a system developer to design and implement such infrastructure. Figure 1 shows detection as a separate entity. However, inside the database, detection can be tightly integrated, through SQL, within the ETL process itself (indicated by the dashed box in Figure 1). The following example demonstrates how this integration is achieved in the IDC prototype. We make use of Relational Oracle10g Release 2 PREDICTION SQL operator. The audit data are classified as attack or not by the misuse detection SVM model. The model scoring is part of a database INSERT statement: INSERT INTO attack_predictions (id, prediction) VALUES(10001, PREDICTION( misuse_model USING 'tcp' AS protocol_type,'ftp' AS service, ... 'SF' AS flag, 27 AS duration)); In addition to real-time detection, it is useful to perform offline scoring of stored audit data. This provides an assessment of model performance, characterizes the type and volume of malicious activity, and assists in the discovery of unusual patterns. Having detection cast as an SQL operator allows powerful database features to be leveraged. In our prototype, we create a functional index on the probability of a case being an attack. The following SQL code snippet shows the index creation statement: CREATE INDEX attack_prob_idx ON audit_data (PREDICTION_PROBABILITY( anomaly_model, 0 USING *));
  • 8. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 27 | Page Figure 3. Relational grid computing We use the anomaly detection SVM model. The 0 argument indicates that the probability of an anomaly/attack will be returned. Alternatively, a value of 1 would produce the probability of a connection being normal. The * symbol maps the audit_data table columns to the list of predictors used during the model build. The functional index optimizes query performance on the audit data table when filtering or sorting on anomaly/attack probability is desired. The following query, which returns all cases in audit_data with probability greater than 0.5 of being an attack, will have better performance if the attack_prob_idx index is used: SELECT * FROM audit_data WHERE PREDICTION_PROBABILITY( anomaly_model, 0 USING *) > 0.5; Processing high volumes of streaming audit data requires a system capable of scoring large datasets in real time. Figure 4 illustrates the PREDICTION operator’s scalability. The scalability results were generated using a linear SVM misuse model built on 500,000 connection records. The same hardware was used as in the build timing tests. The SQL PREDICTION operators also allow for the combination of multiple data mining models that are scored either serially or in parallel, thus enabling hierarchical and cooperative detection approaches. Models can be built on different types of audit data or different timeframes, can have different scope (localized vs. global detectors), and can use different data mining algorithms. The combination of multiple models and techniques has been found to be a key requirement for a successful data mining-based IDS . The next example shows a hypothetical use case where two models perform parallel cooperative detection. The query returns all cases where either model1 or model2 indicate an attack with probability higher than 0.4: SELECT * FROM audit_data WHERE PREDICTION_PROBABILITY( model1, 'attack' USING *) > 0.4 OR PREDICTION_PROBABILITY( model2, 'attack' USING *) > 0.4; SELECT * FROM audit_data WHERE PREDICTION_PROBABILITY( model1, 'attack' USING *) > 0.4 OR PREDICTION_PROBABILITY( model2, 'attack' USING *) > 0.4; SELECT id, PREDICTION( misuse_model USING *) FROM audit_data WHERE PREDICTION_PROBABILITY( anomaly_model, 0 USING *) > 0.5;
  • 9. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 28 | Page Figure 4. Prediction scalability In the current IDC prototype, the misuse and anomaly detection models are scored independently. We plan on extending the IDC implementation with sequential (or “pipelined”) cooperative detection, where the results of one model influence the predictions of another model. In this case, when the anomaly model classifies a case as an attack with probability greater than 0.5, the misuse model will attempt to identify the type of attack: 2.7. Alerts Upon detection of malicious or anomalous activity, an IDS needs to generate an alarm, notify interested parties, and possibly initiate a response. Such a requirement can be easily met by employing existing Relational database infrastructure. Database triggers are powerful SQL mechanisms that initiate a predefined action when a specific condition is met. The following statement shows the trigger definition used in the IDC prototype where an attack results in posting a message in a queue for handling attack notifications: CREATE TRIGGER alert_trg BEFORE INSERT ON attack_predictions FOR EACH ROW WHEN (new.prediction <> 'normal') BEGIN DBMS_AQ.ENQUEUE( 'attack_notify_queue', ...); END; The IDC prototype uses Relational Oracle 10g Publish-Subscribe messaging infrastructure (DBMS_AQ PL/SQL package). We chose Publish-Subscribe as the messaging approach since it handles well asynchronous communications in distributed systems that operate in a loosely-coupled and autonomous fashion and which require operational immunity from network failures. The detectors act as publishers who send alerts without explicitly specifying recipients. The subscribers (users/applications) receive only messages that they have registered an interest in. The decoupling of senders and receivers is achieved via a queuing mechanism. Each queue represents a subject or a channel. Active publication of information to end users in an event-driven manner complements the more traditional pull-oriented approaches to accessing information that are also available in Relational. IDS alert scan be also delivered via a diverse range of channels (e.g., e-mails, cell phone messages). In the IDC prototype, an Relational Application server Portal-based application – the Intrusion Detection Center dashboard – monitors the state of the network and displays relevant information. One of the tasks of the IDC dashboard is to monitor the alert queue alert notifications. Figure 5 shows a screenshot of the IDC dashboard. The alert notification information includes the type of attack (based on them issued model prediction) and some of the important connection details.
  • 10. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 29 | Page Figure 5. IDC dashboard 3.8. Reports and analysis Using the database as the platform for IDS implementation facilitates the generation of data analysis results and reports. Collected audit data, detection predictions, as well as model contents, can be inspected either directly using queries or via higher level reporting and visualization tools (e.g., Discoverer, Relational Reports). This allows circumvention of a lengthy application development process and provides a standardized and easily customized Report generation and delivery mechanism. The IDC dashboard leverages the tools available in Relational Portal to instrument a network activity reporting and analysis mechanism. On the main page (Figure 5), users can monitor: • Number of intrusion attempts during the past 24 hours (top left panel) • Breakdown of the network activity into normal and specific types of attack (top center panel) • Detector error rate over the last 7 days (top right panel) • Log of recent alerts (bottom panel) Figure 6. IDC detail statistics On the details page (Figure 6), users can review historic data. When a date is selected in the top left panel, the graphs are updated with the corresponding network activity information. The bottom left panel displays the breakdown of network activity into normal and specific types of attack for the selected date. The middle panels show the distribution of connection activity over different types of protocol, service, etc. Clicking on any of the bars produces a breakdown of the network activity (normal and types of attack) for this particular value. For example, in Figure 5 the top right panel shows the breakdown of activity for the tcp protocol for the selected date. IV. Conclusion and Future Scope This paper reviews and tried to summarize different types, methods and approaches for intrusion detection system and also provides a strong platform to detect anomalies. Database-centric IDSs offer many advantages over alternative systems. These include tight integration of individual components, security, scalability, and high availability. The proposed model is in its initial stage where an initial algorithm is proposed. Current trends in RDBMSs are moving towards providing all key components for delivering comprehensive state-of-the-art IDSs.
  • 11. The Practical Data Mining Model for Efficient IDS through Relational Databases www.ijres.org 30 | Page As illustrated above, Relational Database 10g Release 2 already incorporates these key functionality elements. By leveraging the existing technology stack, a full-fledged IDS can be developed in a reasonably short time- frame and at low development cost. The similarities between real-time intrusion detection and real-time fraud detection (e.g., credit-card fraud, e-commerce fraud) suggest that DAID could be also applicable to these types of applications. This will be investigated in a future work. We also plan to extend the IDC prototype to take advantage of RAC and sensor data preprocessing at the ETL stage. Reference [1] Mukkamala, S., Janoski, G., and Sung, A., Intrusion Detection Using Neural Networks and Support Vector Machines, In Proc. of IEEE International Joint Conference on Neural Networks, IEEE Press, 2002, pp. 1702-1707. [2] Hu, W., Liao, Y., and Vemuri, V. R., Robust Support Vector Machines for Anomaly Detection in Computer Security, In Proc. International Conference on Machine Learning and Applications, 2003, pp. 168-174. [3] Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu,N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001, pp. 15-24. [4] DataDirect Technologies, Using Oracle Real Application Clusters (RAC), http://www.datadirect.com/techzone/odbc/docs/odbc_oracle_rac.pdf, 2004. [5] DBMS_DATA_MINING PL/SQL package, Oracle10g PL/SQL packages and types reference, Ch. 23, Oracle Corporation, 2003. [6] Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo, S. J., A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, MA, 2002, pp. 78-99. [7] Zhang, Y., Lee, W., and Huang, Y.-A., Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks, 9(5), 2003, pp. 545-556. [8] Youssif Al-Nashif, Aarthi Arun Kumar, Salim Hariri,Guangzhi Qu, Yi Luo and Ferenc Szidarovsky (2008) Multi-Level intrusion detection system. IEEE, Intl. Conf. on Automonic Computing. pp:131-140. [9] Sangeetha S, Vaidehi V, Srinivasan N, Rajkumar KV, Pradeep S, Ragavan N, Sri Sai Lokesh C,Subadeepak I and Prashanth V (2008) Implementation of application layer intrusion detection system using protocol analysis. IEEE-Intl Conf. on Signal processing, Commun. & Networking .pp:279-284. [10] Ya-Li Ding, Lei Li and Hong-Qi Luo (2009) A novel signature searching for intrusion detection system using data mining. IEEE 8th Intl. Conf. on Machine Learning & Cybernetics. ISBN: 978-1-4244-3703-0.pp:122-126. [11] Lu Huijuan, Chen Jianguo and d Wei Wei (2008) Two stratum Bayesian network based anomaly detection model for intrusion detection system. IEEE, Intl. Symp. on Electronic Commerce & Security.pp:482-487. [12] Su MY, Chang KC, Wei HF and Lin CY (2008) A real-time network intrusion detection system based on incremental mining approach. IEEE.pp: 76- 81. [13] Joong-Hee Leet, Jong-Hyouk Leet, Seon-Gyoung Sohn, Jong-Ho Ryu, and Tai-Myoung Chungt (2008) Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system.IEEE, ISBN: 978-89-5519-136-3. [14] G. Silo wash, D. Cappelli, A. Moore, R. Trzeciak, T. Shim all, and L. Flynn, “Common sense guide to mitigating insider threats, 4th edition,” Software Engineering Institute, Carnegie Mellon University, Tech.Rep. CMU/SEI-2012-TR-012, 2012. [15] M. Salem, S. Hers kop, and S. Stolfo, “A survey of insider attack detection research,” Insider Attack and Cyber Security, pp. 69– 90, 2008. [16] http://www.academia.edu/4052668/Computer_and_Network_Security_Threats [17] http://www.clico.pl/services/Principles_Network_Security_Design.pdf [18] http://www.interhack.net/pubs/network-security.pdf [19] http://www.potaroo.net/t4/pdf/security.pdf [20] http://web.mit.edu/~bdaya/www/Network%20Security.pdf [21] http://web.mit.edu/~bdaya/www/Network%20Security.pdf [22] C. Thomas and N. Balakrishnan, “Issues and Challenges in Intrusion Detection with Skewed Network Traffic,” 2013. [23] M. O. Pervaiz, M. Cardei, and J. Wu, “Routing security in ad hoc wireless networks,” in Network Security, Springer, 2010, pp. 117–142. [24] M. Hall, E. Frank, G. Holmes, B. Pfahringer,P. Reutemann, and I. H. Witten, “The WEKA data mining software: an update,” ACM SIGKDD Explorations Newsletter, vol. 11, no. 1, pp. 10–18, 2009. [25] James Hoagland, “The Teredo Protocol Tunneling Past Network Security and Other Security Implications - Google Search,” Symantec Advanced Threat Research, United States, 2006.