New algorithm mining intrusion patterns

Wu Liu,Jian-Ping Wu,Hai-Xin Duan,Xing Li
DOI: https://doi.org/10.1007/11540007_96
2006-01-01
Abstract:In this paper, we apply data mining techniques to construct intrusion detection patterns. We mine both system audit data and network traffic data for consistent and useful patterns of program and user behavior, and use an iterative low-frequency-finder mining algorithm to find the low frequency but important patterns.
What problem does this paper attempt to address?