Intrusion Patterns Mining in IDS

郭泓,曹元大
DOI: https://doi.org/10.3969/j.issn.1001-0645.2003.02.020
2003-01-01
Journal of Beijing Institute of Technology
Abstract:Data mining techniques are used to deal with the huge mount of information of log audit data and detect the network intrusion patterns. The key idea is to discover the useful patterns that describe user behavior by utilizing two general mining algorithms: the association rules algorithm and the frequent episodes algorithm. They can be used to compute the intra audit and inter audit record patterns. To meet the challenges of high speed and efficient mining, we amend the algorithms to reach a good balance between the time and space by using a bit vector indicating the frequent item.
What problem does this paper attempt to address?