SlideShare a Scribd company logo
1 of 17
Data Mining for Intrusion Detection
DM for IDS
Outline
 Data Mining
 Intrusion Detection
 Data Mining for Intrusion Detection
Data Mining
 KDD (Knowledge Discovery in Databases):
• The process of identifying valid, novel, useful
understandable patterns in data.
• Steps: understanding the application domain, data
preparation, data mining, interpretation, and
utilizing the discovered knowledge.
• Data Mining (DM): applying specific algorithms to
extract patterns of data.
• DM is the core of KDD.
Data Mining (cont.)
 KDD vs. DM:
Data Mining (cont.)
 Data mining techniques & Algorithms:
 Classification: classify or map a data item to one
of predefined classes, decision tree algorithm.
 Clustering: grouping similar data items into
clusters, K-mean algorithm.
 Frequent pattern mining: finds patterns or
regularities that occur together.
 Sequential pattern analysis: time-based, order of
patterns is important.
Outline
 Data Mining
 Intrusion Detection
 Data Mining for Intrusion Detection
Intrusion Detection
 Computer security goals: confidentiality,
integrity, and availability.
 Intrusion: is a set of actions aimed to
compromise these goals.
 Intrusion prevention (authentication, encryption,
etc.) alone is not sufficient.
 Intrusion detection (ID) is needed
 ID: is the process of identifying intrusions in a
system.
 IDS: combination of hardware & software that
detect intrusions and raise alarms.
Intrusion Detection (cont.)
 Primary assumption: users and system
activities and resources can be monitored and
analyzed.
 Two types techniques of ID:
A. Misuse detection: use pattern of well-known
attack (signature) to identify intrusion, pattern-
based; Email example.
B. Anomaly detection: use deviation of normal
usage pattern to identify intrusions, profile-
based; user behavior example;
Intrusion Detection
 Misuse Detection
 Main Problems:
• Unknown intrusions can not be detected (that have
no matches patter in the system)
• Manual coding of known intrusion patterns.
Intrusion Detection (cont.)
 Anomaly detection:
 Main problems:
Selecting the right set of system features to be
measured in based on experience.
Unable to capture sequential interrelation between
events.
Intrusion Detection
 Example applications:
1. SNORT (www.snort.org) for misuse detection:
• It is an open source signature based IDS
• It stores signatures of each known intrusion.
1. Computer watch (AT&T) for anomaly detection:
• It is an expert system that summarize security
sensitive events and apply rules to detect
anomalies behaviors.
Outline
 Data Mining
 Intrusion Detection
 Data Mining for Intrusion Detection
Data Mining for ID
 Why DM is applicable in intrusion detection?
• Intrusion detection is a data analysis process.
• Normal and intrusive activities leave evidence in
audit data.
• Learn from traffic data:
• Supervised learning: learn precise models from past
intrusions.
• Unsupervised learning: identifying suspicious activities.
Data Mining for ID
 Data Mining based IDS – basic steps:
Data Mining for ID
 Misuse detection:
• Predictive models are built from labeled data sets (
instances are labeled as “normal” or “intrusive”.
• These models can be more sophisticated and precise
than manually created signatures.
• Classification techniques from DM are used.
 Anomaly Detection:
 Identifies anomalies as deviation from “normal”
behavior.
 EX, ADAM: Audit Data Analysis and Mining; MINDS –
MINnesota INtrusion Detection System
MINDS Project
Thanks!
Any questions?

More Related Content

What's hot

Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
ijtsrd
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
Dr. Amrita .
 

What's hot (20)

INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
INTRUSION DETECTION SYSTEM CLASSIFICATION USING DIFFERENT MACHINE LEARNING AL...
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Deep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection systemDeep learning approach for network intrusion detection system
Deep learning approach for network intrusion detection system
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
 
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
Seminar Report | Network Intrusion Detection using Supervised Machine Learnin...
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
Intrusion Detection System Project Report
Intrusion Detection System Project ReportIntrusion Detection System Project Report
Intrusion Detection System Project Report
 
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for  Intrusion DetectionCloudslam09:Building a Cloud Computing Analysis System for  Intrusion Detection
Cloudslam09:Building a Cloud Computing Analysis System for Intrusion Detection
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
Lessons Learned from Teaching Intrusion Detection and Intrusion Prevention wi...
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Testbed For Ids
Testbed For IdsTestbed For Ids
Testbed For Ids
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Network Security Data Visualization
Network Security Data VisualizationNetwork Security Data Visualization
Network Security Data Visualization
 
Ids 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systemsIds 00 introduction_ intrusion detection & prevention systems
Ids 00 introduction_ intrusion detection & prevention systems
 

Viewers also liked

Data Mining
Data MiningData Mining
Data Mining
shrapb
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
Sheetal Verma
 

Viewers also liked (7)

Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Data Mining
Data MiningData Mining
Data Mining
 
02 Related Concepts
02 Related Concepts02 Related Concepts
02 Related Concepts
 
Intrusion detection system ppt
Intrusion detection system pptIntrusion detection system ppt
Intrusion detection system ppt
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
introduction to data mining tutorial
introduction to data mining tutorial introduction to data mining tutorial
introduction to data mining tutorial
 

Similar to DM for IDS

IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
 
D0261019025
D0261019025D0261019025
D0261019025
theijes
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
Editor IJMTER
 

Similar to DM for IDS (20)

Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)Study on Data Mining Suitability for Intrusion Detection System (IDS)
Study on Data Mining Suitability for Intrusion Detection System (IDS)
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
V1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docxV1_I1_2012_Paper3.docx
V1_I1_2012_Paper3.docx
 
I Dunderstn
I DunderstnI Dunderstn
I Dunderstn
 
data mining
data miningdata mining
data mining
 
C3602021025
C3602021025C3602021025
C3602021025
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational DatabasesThe Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
 
D0261019025
D0261019025D0261019025
D0261019025
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
Intrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention systemIntrusion detection system and intrusion prevention system
Intrusion detection system and intrusion prevention system
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAINSURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
SURVEY OF NETWORK ANOMALY DETECTION USING MARKOV CHAIN
 
Survey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chainSurvey of network anomaly detection using markov chain
Survey of network anomaly detection using markov chain
 
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptxSupervised Machine Learning Algorithms for Intrusion Detection.pptx
Supervised Machine Learning Algorithms for Intrusion Detection.pptx
 

DM for IDS

  • 1. Data Mining for Intrusion Detection DM for IDS
  • 2. Outline  Data Mining  Intrusion Detection  Data Mining for Intrusion Detection
  • 3. Data Mining  KDD (Knowledge Discovery in Databases): • The process of identifying valid, novel, useful understandable patterns in data. • Steps: understanding the application domain, data preparation, data mining, interpretation, and utilizing the discovered knowledge. • Data Mining (DM): applying specific algorithms to extract patterns of data. • DM is the core of KDD.
  • 5. Data Mining (cont.)  Data mining techniques & Algorithms:  Classification: classify or map a data item to one of predefined classes, decision tree algorithm.  Clustering: grouping similar data items into clusters, K-mean algorithm.  Frequent pattern mining: finds patterns or regularities that occur together.  Sequential pattern analysis: time-based, order of patterns is important.
  • 6. Outline  Data Mining  Intrusion Detection  Data Mining for Intrusion Detection
  • 7. Intrusion Detection  Computer security goals: confidentiality, integrity, and availability.  Intrusion: is a set of actions aimed to compromise these goals.  Intrusion prevention (authentication, encryption, etc.) alone is not sufficient.  Intrusion detection (ID) is needed  ID: is the process of identifying intrusions in a system.  IDS: combination of hardware & software that detect intrusions and raise alarms.
  • 8. Intrusion Detection (cont.)  Primary assumption: users and system activities and resources can be monitored and analyzed.  Two types techniques of ID: A. Misuse detection: use pattern of well-known attack (signature) to identify intrusion, pattern- based; Email example. B. Anomaly detection: use deviation of normal usage pattern to identify intrusions, profile- based; user behavior example;
  • 9. Intrusion Detection  Misuse Detection  Main Problems: • Unknown intrusions can not be detected (that have no matches patter in the system) • Manual coding of known intrusion patterns.
  • 10. Intrusion Detection (cont.)  Anomaly detection:  Main problems: Selecting the right set of system features to be measured in based on experience. Unable to capture sequential interrelation between events.
  • 11. Intrusion Detection  Example applications: 1. SNORT (www.snort.org) for misuse detection: • It is an open source signature based IDS • It stores signatures of each known intrusion. 1. Computer watch (AT&T) for anomaly detection: • It is an expert system that summarize security sensitive events and apply rules to detect anomalies behaviors.
  • 12. Outline  Data Mining  Intrusion Detection  Data Mining for Intrusion Detection
  • 13. Data Mining for ID  Why DM is applicable in intrusion detection? • Intrusion detection is a data analysis process. • Normal and intrusive activities leave evidence in audit data. • Learn from traffic data: • Supervised learning: learn precise models from past intrusions. • Unsupervised learning: identifying suspicious activities.
  • 14. Data Mining for ID  Data Mining based IDS – basic steps:
  • 15. Data Mining for ID  Misuse detection: • Predictive models are built from labeled data sets ( instances are labeled as “normal” or “intrusive”. • These models can be more sophisticated and precise than manually created signatures. • Classification techniques from DM are used.  Anomaly Detection:  Identifies anomalies as deviation from “normal” behavior.  EX, ADAM: Audit Data Analysis and Mining; MINDS – MINnesota INtrusion Detection System