SlideShare ist ein Scribd-Unternehmen logo
1 von 40
Shobhit Shukla
Reg No:1831310013
M.Tech Cloud Computing
01/18/15 Data Mining in Intrusion Detection 2
 Intrusion detection and computer security
 Current intrusion detection approaches
 Data mining
 Data mining tool-Weka
01/18/15 Data Mining in Intrusion Detection 3
 Computer security goals: confidentiality,
integrity, and availability
 Intrusion is a set of actions aimed to
compromise these security goals
 Intrusion prevention (authentication,
encryption, etc.) alone is not sufficient
 Intrusion detection is needed
01/18/15 Data Mining in Intrusion Detection 4
 Primary assumption: user and program
activities can be monitored and modeled
 Key elements:
 Resources to be protected
 Models of the “normal” or “legitimate”
behavior on the resources
 Efficient methods that compare real-time
activities against the models and report
probably “intrusive” activities.
01/18/15 Data Mining in Intrusion Detection 5
 Two categories of techniques:
 Misuse detection: use patterns of well-known
attacks to identify intrusions
 Anomaly detection: use deviation from normal
usage patterns to identify intrusions
 Knowledge Discovery in Databases (KDD)
 “Process of extracting useful information from large databases”
 KDD basic steps
1. Understanding the application domain
2. Data integration and selection
3. Data mining
4. Pattern Evaluation
5. Knowledge representation
 Related Fields
 Machine learning, statistics, others
01/18/15 Data Mining in Intrusion Detection 6
 “concerned with uncovering patterns, associations, changes, anomalies,
and statistically significant structures and events in data”
 Why Data Mining?
 Understand existing data
 Predict new data
 Components
 Representation
▪ Decide on what model can we build.
▪ Model is a compact summary of examples.
 Learning Element
▪ Builds a model from a set of examples
 Performance Element
▪ Applies the model to new observations
01/18/15 7Data Mining in Intrusion Detection
01/18/15 Data Mining in Intrusion Detection 8
 Why is it applicable to intrusion detection?
 Normal and intrusive activities leave evidence
in audit data
 From the data-centric point view, intrusion
detection is a data analysis process
 Successful applications in related domains,
e.g., fraud detection, fault/alarm
management
 Well-known and used in Intrusion Detection
 Association Rules [Descriptive]
 Classification [Predictive]
 Clustering [Descriptive]
 Preliminary step
 Raw Data  DatabaseTable (Training set)
 Columns – Attributes
 Rows - Records
01/18/15 Data Mining in Intrusion Detection 9
 Motivated by market-basket analysis
 Generate Rules that capture implications between
attribute values
 Rule Example
 Lettuce &Tomato -> Salad Dressing [0.4, 0.9]
 Parameters [s, c]
 Support (s) % records satisfy LHS and RHS
 Confidence (c) = P(satisfies RHS | satisfies LHS)
 Mining Problem
 “Find all association rules that have support and
confidence > user-defined minimum value”
01/18/15 Data Mining in Intrusion Detection 10
 Predefined set of classes
 Training set has Class as one of the attributes
 Supervised Learning
 Mining Problem
 “Find a model for class attribute as a function of the values of other
attributes”
 Use model to predict class
for new records
 Classifier representation
 If-then Rules
 DecisionTrees
01/18/15 Data Mining in Intrusion Detection 11
 Given Data Set and Similarity Measure
 Unsupervised Learning
 Mining Problem
 “Group records into clusters such that all records within a cluster are more similar to one
another . And records in separate clusters are less similar another”
 Similarity Measures:
 Euclidean Distance if attributes are continuous.
 Other Problem-specific Measures.
 Clustering Methods
 Partitioning
▪ Divide data into disjoint partitions
 Hierarchical
▪ Root is complete data set, Leaves are individual records, and Intermediate layers -> partitions
01/18/15 Data Mining in Intrusion Detection 12
 Detection Approach
 Misuse Detection
▪ Based on known malicious patterns
(signatures)
 Anomaly Detection
▪ Based on deviations from established
normal patterns (profiles)
 Data Source
 Network-based (NIDS)
▪ Network traffic
 Host-based (HIDS)
▪ Audit trails
01/18/15 13Data Mining in Intrusion Detection
 Signature extraction
 Rule matching
 Alarm data analysis
 Reduce false alarms
 Eliminate redundant alarms
 Feature selection
 Training Data cleaning
01/18/15 Data Mining in Intrusion Detection 14
 Behavioral Features for Network Anomaly Detection
 Attribute values cannot be used as features
 Interpretation of protocol specifications
 Transform attributes into behavior features
 aggregation of the attribute values
 Data Mining Challenges
 Self-tuning data mining techniques
 Pattern-finding and prior knowledge
 Modeling of temporal data
 Scalability
 Incremental mining
01/18/15 15Data Mining in Intrusion Detection
01/18/15 Data Mining in Intrusion Detection 16
01/18/15 Data Mining in Intrusion Detection 17
 Waikato Environment for Knowledge Analysis
 It’s a data mining/machine learning tool
developed by Department of Computer
Science, University of Waikato, New Zealand.
 Weka is also a bird found only on the islands of
New Zealand.
01/18/15 Data Mining in Intrusion Detection 18
 49 data preprocessing tools
 76 classification/regression algorithms
 8 clustering algorithms
 3 algorithms for finding association rules
 15 attribute/subset evaluators + 10 search
algorithms for feature selection
18 01/18/15
01/18/15 Data Mining in Intrusion Detection 19
 Three graphical user interfaces
 “The Explorer” (exploratory data analysis)
 “The Experimenter” (experimental
environment)
 “The KnowledgeFlow” (new process model
inspired interface)
19 01/18/15
01/18/15 Data Mining in Intrusion Detection 20
01/18/1520
 Data can be imported from a file in various
formats: ARFF, CSV, C4.5, binary
 Data can also be read from a URL or from
an SQL database (using JDBC)
 Pre-processing tools in WEKA are called
“filters”
 WEKA contains filters for:
 Discretization, normalization, resampling,
attribute selection, transforming and
combining attributes, …
01/18/15 Data Mining in Intrusion Detection 21
01/18/15University of Waikato21
01/18/15 Data Mining in Intrusion Detection 22
01/18/15University of Waikato22
01/18/15 Data Mining in Intrusion Detection 23
01/18/15University of Waikato23
01/18/15 Data Mining in Intrusion Detection 24
01/18/15University of Waikato24
01/18/15 Data Mining in Intrusion Detection 25
01/18/15University of Waikato25
01/18/15 Data Mining in Intrusion Detection 26
01/18/15University of Waikato26
01/18/15 Data Mining in Intrusion Detection 27
01/18/15University of Waikato27
01/18/15 Data Mining in Intrusion Detection 28
01/18/1528
 Classifiers in WEKA are models for
predicting nominal or numeric quantities
 Implemented learning schemes include:
 Decision trees and lists, instance-based
classifiers, support vector machines, multi-
layer perceptrons, logistic regression, Bayes’
nets, …
01/18/15 Data Mining in Intrusion Detection 29
01/18/15
University of Waikato
29
01/18/15 Data Mining in Intrusion Detection 30
01/18/15
University of Waikato
30
01/18/15 Data Mining in Intrusion Detection 31
01/18/15
University of Waikato
31
01/18/15 Data Mining in Intrusion Detection 32
01/18/15University of Waikato32
01/18/15 Data Mining in Intrusion Detection 33
01/18/15University of Waikato33
01/18/15 Data Mining in Intrusion Detection 34
01/18/15University of Waikato34
01/18/15 Data Mining in Intrusion Detection 35
01/18/15University of Waikato35
01/18/15 Data Mining in Intrusion Detection 36
01/18/15University of Waikato36
01/18/15 Data Mining in Intrusion Detection 37
01/18/15University of Waikato37
01/18/15 Data Mining in Intrusion Detection 38
01/18/15University of Waikato38
01/18/15 Data Mining in Intrusion Detection 39
01/18/15University of Waikato39
01/18/15 Data Mining in Intrusion Detection 40

Weitere ähnliche Inhalte

Was ist angesagt?

Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...Dr. Amrita .
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detectionMohamed Elfadly
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESTrinity Dwarka
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...CloudTechnologies
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsOmar Shaya
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Mahdi Hosseini Moghaddam
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Jowin John Chemban
 
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Infocyte
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionProgrammer
 
Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approachesjyoti_lakhani
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)Netwax Lab
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 

Was ist angesagt? (20)

Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
Cyber intrusion
Cyber intrusionCyber intrusion
Cyber intrusion
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
2 14-1346479656-1- a study of feature selection methods in intrusion detectio...
 
A review of machine learning based anomaly detection
A review of machine learning based anomaly detectionA review of machine learning based anomaly detection
A review of machine learning based anomaly detection
 
Intrusion Detection
Intrusion DetectionIntrusion Detection
Intrusion Detection
 
INTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUESINTRUSION DETECTION TECHNIQUES
INTRUSION DETECTION TECHNIQUES
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...Network intrusion detection using supervised machine learning technique with ...
Network intrusion detection using supervised machine learning technique with ...
 
Using Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection SystemsUsing Machine Learning in Networks Intrusion Detection Systems
Using Machine Learning in Networks Intrusion Detection Systems
 
Practical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approachesPractical real-time intrusion detection using machine learning approaches
Practical real-time intrusion detection using machine learning approaches
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
Seminar Presentation | Network Intrusion Detection using Supervised Machine L...
 
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Ids 013 detection approaches
Ids 013 detection approachesIds 013 detection approaches
Ids 013 detection approaches
 
IDS (intrusion detection system)
IDS (intrusion detection system)IDS (intrusion detection system)
IDS (intrusion detection system)
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
C3602021025
C3602021025C3602021025
C3602021025
 

Andere mochten auch

02 restoring dominion
02 restoring dominion02 restoring dominion
02 restoring dominionchucho1943
 
09. идолы души
09. идолы души09. идолы души
09. идолы душиchucho1943
 
Livre Acesso Turismo - Conheça nossa empresa
Livre Acesso Turismo - Conheça nossa empresaLivre Acesso Turismo - Conheça nossa empresa
Livre Acesso Turismo - Conheça nossa empresaThiago Zacharias
 
Analisis estructural de hamlet
Analisis estructural de hamletAnalisis estructural de hamlet
Analisis estructural de hamletrosangel torres
 
Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...
Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...
Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...jespadill
 
Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...
Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...
Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...jespadill
 
Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...
Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...
Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...jespadill
 
Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...
Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...
Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...jespadill
 
Lección 13 | Primarios | Un largo viaje | Escuela Sabática Menores
Lección 13 | Primarios | Un largo viaje | Escuela Sabática MenoresLección 13 | Primarios | Un largo viaje | Escuela Sabática Menores
Lección 13 | Primarios | Un largo viaje | Escuela Sabática Menoresjespadill
 
Podstawy zarządzania - wykład 11
Podstawy zarządzania - wykład 11Podstawy zarządzania - wykład 11
Podstawy zarządzania - wykład 11Krzysztof Klincewicz
 
PDF | Lección 1 | El fin | Escuela Sabática | El libro de Job
PDF | Lección 1 | El fin | Escuela Sabática | El libro de JobPDF | Lección 1 | El fin | Escuela Sabática | El libro de Job
PDF | Lección 1 | El fin | Escuela Sabática | El libro de Jobjespadill
 
Lección 5 | Infantes | El gran barco de Noé | Escuela Sabática Menores
Lección 5 | Infantes | El gran barco de Noé | Escuela Sabática MenoresLección 5 | Infantes | El gran barco de Noé | Escuela Sabática Menores
Lección 5 | Infantes | El gran barco de Noé | Escuela Sabática Menoresjespadill
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...Nishant Mehta
 
Peranan manusia dalam lingkungan perspektif islam
Peranan manusia dalam lingkungan perspektif islamPeranan manusia dalam lingkungan perspektif islam
Peranan manusia dalam lingkungan perspektif islamNizar Syamsi
 
οι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακους
οι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακουςοι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακους
οι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακουςsomakris
 
04 justicia y misericordia at ii
04 justicia y misericordia at ii04 justicia y misericordia at ii
04 justicia y misericordia at iichucho1943
 
03 justicia y misericordia at 1
03 justicia y misericordia at 103 justicia y misericordia at 1
03 justicia y misericordia at 1chucho1943
 

Andere mochten auch (18)

02 restoring dominion
02 restoring dominion02 restoring dominion
02 restoring dominion
 
09. идолы души
09. идолы души09. идолы души
09. идолы души
 
Livre Acesso Turismo - Conheça nossa empresa
Livre Acesso Turismo - Conheça nossa empresaLivre Acesso Turismo - Conheça nossa empresa
Livre Acesso Turismo - Conheça nossa empresa
 
Analisis estructural de hamlet
Analisis estructural de hamletAnalisis estructural de hamlet
Analisis estructural de hamlet
 
Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...
Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...
Intermediario | Lección 12 | David codicia a Betsabé | Escuela Sabática para ...
 
Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...
Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...
Manual para Directores | Intermediarios | Escuela Sabática Menores | Primer t...
 
Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...
Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...
Lección 2 | Juveniles | El hijo escogido | Escuela Sabática Menores 2016 | Pr...
 
Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...
Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...
Auxiliar Infantes | Auxiliar para Directores y Maestros de Escuela Sabática |...
 
Lección 13 | Primarios | Un largo viaje | Escuela Sabática Menores
Lección 13 | Primarios | Un largo viaje | Escuela Sabática MenoresLección 13 | Primarios | Un largo viaje | Escuela Sabática Menores
Lección 13 | Primarios | Un largo viaje | Escuela Sabática Menores
 
Podstawy zarządzania - wykład 9
Podstawy zarządzania - wykład 9Podstawy zarządzania - wykład 9
Podstawy zarządzania - wykład 9
 
Podstawy zarządzania - wykład 11
Podstawy zarządzania - wykład 11Podstawy zarządzania - wykład 11
Podstawy zarządzania - wykład 11
 
PDF | Lección 1 | El fin | Escuela Sabática | El libro de Job
PDF | Lección 1 | El fin | Escuela Sabática | El libro de JobPDF | Lección 1 | El fin | Escuela Sabática | El libro de Job
PDF | Lección 1 | El fin | Escuela Sabática | El libro de Job
 
Lección 5 | Infantes | El gran barco de Noé | Escuela Sabática Menores
Lección 5 | Infantes | El gran barco de Noé | Escuela Sabática MenoresLección 5 | Infantes | El gran barco de Noé | Escuela Sabática Menores
Lección 5 | Infantes | El gran barco de Noé | Escuela Sabática Menores
 
To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
Peranan manusia dalam lingkungan perspektif islam
Peranan manusia dalam lingkungan perspektif islamPeranan manusia dalam lingkungan perspektif islam
Peranan manusia dalam lingkungan perspektif islam
 
οι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακους
οι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακουςοι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακους
οι διαφορες αναμεσα στους αρχαιους και συγχρονους ολυμπιακους
 
04 justicia y misericordia at ii
04 justicia y misericordia at ii04 justicia y misericordia at ii
04 justicia y misericordia at ii
 
03 justicia y misericordia at 1
03 justicia y misericordia at 103 justicia y misericordia at 1
03 justicia y misericordia at 1
 

Ähnlich wie Pptbb

D0261019025
D0261019025D0261019025
D0261019025theijes
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber securityPranto26
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)stelligence
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsCA Technologies
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...ijceronline
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...ijceronline
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log AnalysisJim Kaplan CIA CFE
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS IRJET Journal
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposureredpel dot com
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big DataRaffael Marty
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detectionijsrd.com
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteData Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteHPCC Systems
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber securityPsychoCryGaming
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePvrtechnologies Nellore
 

Ähnlich wie Pptbb (20)

D0261019025
D0261019025D0261019025
D0261019025
 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
 
Burton - Security, Privacy and Trust
Burton - Security, Privacy and TrustBurton - Security, Privacy and Trust
Burton - Security, Privacy and Trust
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
 
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
New Hybrid Intrusion Detection System Based On Data Mining Technique to Enhan...
 
Cybersecurity Series SEIM Log Analysis
Cybersecurity Series  SEIM Log AnalysisCybersecurity Series  SEIM Log Analysis
Cybersecurity Series SEIM Log Analysis
 
Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS  Comparison of Data Mining Techniques used in Anomaly Based IDS
Comparison of Data Mining Techniques used in Anomaly Based IDS
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
Data Mining
Data MiningData Mining
Data Mining
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 
Visualization in the Age of Big Data
Visualization in the Age of Big DataVisualization in the Age of Big Data
Visualization in the Age of Big Data
 
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
Data Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 KeynoteData Analytics in Cyber Security - Intellisys 2015 Keynote
Data Analytics in Cyber Security - Intellisys 2015 Keynote
 
Data mining in Cyber security
Data mining in Cyber securityData mining in Cyber security
Data mining in Cyber security
 
Privacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposurePrivacy preserving detection of sensitive data exposure
Privacy preserving detection of sensitive data exposure
 

Kürzlich hochgeladen

High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipurparulsinha
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...narwatsonia7
 
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...narwatsonia7
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...narwatsonia7
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000aliya bhat
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safenarwatsonia7
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaPooja Gupta
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...saminamagar
 
Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Gabriel Guevara MD
 
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalorenarwatsonia7
 
Mumbai Call Girls Service 9910780858 Real Russian Girls Looking Models
Mumbai Call Girls Service 9910780858 Real Russian Girls Looking ModelsMumbai Call Girls Service 9910780858 Real Russian Girls Looking Models
Mumbai Call Girls Service 9910780858 Real Russian Girls Looking Modelssonalikaur4
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Availablenarwatsonia7
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformKweku Zurek
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbaisonalikaur4
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknownarwatsonia7
 
Glomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptxGlomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptxDr.Nusrat Tariq
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowNehru place Escorts
 
Glomerular Filtration and determinants of glomerular filtration .pptx
Glomerular Filtration and  determinants of glomerular filtration .pptxGlomerular Filtration and  determinants of glomerular filtration .pptx
Glomerular Filtration and determinants of glomerular filtration .pptxDr.Nusrat Tariq
 

Kürzlich hochgeladen (20)

High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service JaipurHigh Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
High Profile Call Girls Jaipur Vani 8445551418 Independent Escort Service Jaipur
 
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
Call Girls Kanakapura Road Just Call 7001305949 Top Class Call Girl Service A...
 
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
Housewife Call Girls Bangalore - Call 7001305949 Rs-3500 with A/C Room Cash o...
 
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
Call Girls Service in Bommanahalli - 7001305949 with real photos and phone nu...
 
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Jp Nagar Just Call 7001305949 Top Class Call Girl Service Available
 
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000Ahmedabad Call Girls CG Road 🔝9907093804  Short 1500  💋 Night 6000
Ahmedabad Call Girls CG Road 🔝9907093804 Short 1500 💋 Night 6000
 
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% SafeBangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
Bangalore Call Girls Marathahalli 📞 9907093804 High Profile Service 100% Safe
 
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service NoidaCall Girls Service Noida Maya 9711199012 Independent Escort Service Noida
Call Girls Service Noida Maya 9711199012 Independent Escort Service Noida
 
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...call girls in Connaught Place  DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
call girls in Connaught Place DELHI 🔝 >༒9540349809 🔝 genuine Escort Service ...
 
Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024Asthma Review - GINA guidelines summary 2024
Asthma Review - GINA guidelines summary 2024
 
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service BangaloreCall Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
Call Girl Bangalore Nandini 7001305949 Independent Escort Service Bangalore
 
Mumbai Call Girls Service 9910780858 Real Russian Girls Looking Models
Mumbai Call Girls Service 9910780858 Real Russian Girls Looking ModelsMumbai Call Girls Service 9910780858 Real Russian Girls Looking Models
Mumbai Call Girls Service 9910780858 Real Russian Girls Looking Models
 
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Hosur Just Call 7001305949 Top Class Call Girl Service Available
 
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service AvailableCall Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
Call Girls Whitefield Just Call 7001305949 Top Class Call Girl Service Available
 
See the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy PlatformSee the 2,456 pharmacies on the National E-Pharmacy Platform
See the 2,456 pharmacies on the National E-Pharmacy Platform
 
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service MumbaiLow Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
Low Rate Call Girls Mumbai Suman 9910780858 Independent Escort Service Mumbai
 
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service LucknowVIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
VIP Call Girls Lucknow Nandini 7001305949 Independent Escort Service Lucknow
 
Glomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptxGlomerular Filtration rate and its determinants.pptx
Glomerular Filtration rate and its determinants.pptx
 
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call NowKolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
Kolkata Call Girls Services 9907093804 @24x7 High Class Babes Here Call Now
 
Glomerular Filtration and determinants of glomerular filtration .pptx
Glomerular Filtration and  determinants of glomerular filtration .pptxGlomerular Filtration and  determinants of glomerular filtration .pptx
Glomerular Filtration and determinants of glomerular filtration .pptx
 

Pptbb

  • 2. 01/18/15 Data Mining in Intrusion Detection 2  Intrusion detection and computer security  Current intrusion detection approaches  Data mining  Data mining tool-Weka
  • 3. 01/18/15 Data Mining in Intrusion Detection 3  Computer security goals: confidentiality, integrity, and availability  Intrusion is a set of actions aimed to compromise these security goals  Intrusion prevention (authentication, encryption, etc.) alone is not sufficient  Intrusion detection is needed
  • 4. 01/18/15 Data Mining in Intrusion Detection 4  Primary assumption: user and program activities can be monitored and modeled  Key elements:  Resources to be protected  Models of the “normal” or “legitimate” behavior on the resources  Efficient methods that compare real-time activities against the models and report probably “intrusive” activities.
  • 5. 01/18/15 Data Mining in Intrusion Detection 5  Two categories of techniques:  Misuse detection: use patterns of well-known attacks to identify intrusions  Anomaly detection: use deviation from normal usage patterns to identify intrusions
  • 6.  Knowledge Discovery in Databases (KDD)  “Process of extracting useful information from large databases”  KDD basic steps 1. Understanding the application domain 2. Data integration and selection 3. Data mining 4. Pattern Evaluation 5. Knowledge representation  Related Fields  Machine learning, statistics, others 01/18/15 Data Mining in Intrusion Detection 6
  • 7.  “concerned with uncovering patterns, associations, changes, anomalies, and statistically significant structures and events in data”  Why Data Mining?  Understand existing data  Predict new data  Components  Representation ▪ Decide on what model can we build. ▪ Model is a compact summary of examples.  Learning Element ▪ Builds a model from a set of examples  Performance Element ▪ Applies the model to new observations 01/18/15 7Data Mining in Intrusion Detection
  • 8. 01/18/15 Data Mining in Intrusion Detection 8  Why is it applicable to intrusion detection?  Normal and intrusive activities leave evidence in audit data  From the data-centric point view, intrusion detection is a data analysis process  Successful applications in related domains, e.g., fraud detection, fault/alarm management
  • 9.  Well-known and used in Intrusion Detection  Association Rules [Descriptive]  Classification [Predictive]  Clustering [Descriptive]  Preliminary step  Raw Data  DatabaseTable (Training set)  Columns – Attributes  Rows - Records 01/18/15 Data Mining in Intrusion Detection 9
  • 10.  Motivated by market-basket analysis  Generate Rules that capture implications between attribute values  Rule Example  Lettuce &Tomato -> Salad Dressing [0.4, 0.9]  Parameters [s, c]  Support (s) % records satisfy LHS and RHS  Confidence (c) = P(satisfies RHS | satisfies LHS)  Mining Problem  “Find all association rules that have support and confidence > user-defined minimum value” 01/18/15 Data Mining in Intrusion Detection 10
  • 11.  Predefined set of classes  Training set has Class as one of the attributes  Supervised Learning  Mining Problem  “Find a model for class attribute as a function of the values of other attributes”  Use model to predict class for new records  Classifier representation  If-then Rules  DecisionTrees 01/18/15 Data Mining in Intrusion Detection 11
  • 12.  Given Data Set and Similarity Measure  Unsupervised Learning  Mining Problem  “Group records into clusters such that all records within a cluster are more similar to one another . And records in separate clusters are less similar another”  Similarity Measures:  Euclidean Distance if attributes are continuous.  Other Problem-specific Measures.  Clustering Methods  Partitioning ▪ Divide data into disjoint partitions  Hierarchical ▪ Root is complete data set, Leaves are individual records, and Intermediate layers -> partitions 01/18/15 Data Mining in Intrusion Detection 12
  • 13.  Detection Approach  Misuse Detection ▪ Based on known malicious patterns (signatures)  Anomaly Detection ▪ Based on deviations from established normal patterns (profiles)  Data Source  Network-based (NIDS) ▪ Network traffic  Host-based (HIDS) ▪ Audit trails 01/18/15 13Data Mining in Intrusion Detection
  • 14.  Signature extraction  Rule matching  Alarm data analysis  Reduce false alarms  Eliminate redundant alarms  Feature selection  Training Data cleaning 01/18/15 Data Mining in Intrusion Detection 14
  • 15.  Behavioral Features for Network Anomaly Detection  Attribute values cannot be used as features  Interpretation of protocol specifications  Transform attributes into behavior features  aggregation of the attribute values  Data Mining Challenges  Self-tuning data mining techniques  Pattern-finding and prior knowledge  Modeling of temporal data  Scalability  Incremental mining 01/18/15 15Data Mining in Intrusion Detection
  • 16. 01/18/15 Data Mining in Intrusion Detection 16
  • 17. 01/18/15 Data Mining in Intrusion Detection 17  Waikato Environment for Knowledge Analysis  It’s a data mining/machine learning tool developed by Department of Computer Science, University of Waikato, New Zealand.  Weka is also a bird found only on the islands of New Zealand.
  • 18. 01/18/15 Data Mining in Intrusion Detection 18  49 data preprocessing tools  76 classification/regression algorithms  8 clustering algorithms  3 algorithms for finding association rules  15 attribute/subset evaluators + 10 search algorithms for feature selection 18 01/18/15
  • 19. 01/18/15 Data Mining in Intrusion Detection 19  Three graphical user interfaces  “The Explorer” (exploratory data analysis)  “The Experimenter” (experimental environment)  “The KnowledgeFlow” (new process model inspired interface) 19 01/18/15
  • 20. 01/18/15 Data Mining in Intrusion Detection 20 01/18/1520  Data can be imported from a file in various formats: ARFF, CSV, C4.5, binary  Data can also be read from a URL or from an SQL database (using JDBC)  Pre-processing tools in WEKA are called “filters”  WEKA contains filters for:  Discretization, normalization, resampling, attribute selection, transforming and combining attributes, …
  • 21. 01/18/15 Data Mining in Intrusion Detection 21 01/18/15University of Waikato21
  • 22. 01/18/15 Data Mining in Intrusion Detection 22 01/18/15University of Waikato22
  • 23. 01/18/15 Data Mining in Intrusion Detection 23 01/18/15University of Waikato23
  • 24. 01/18/15 Data Mining in Intrusion Detection 24 01/18/15University of Waikato24
  • 25. 01/18/15 Data Mining in Intrusion Detection 25 01/18/15University of Waikato25
  • 26. 01/18/15 Data Mining in Intrusion Detection 26 01/18/15University of Waikato26
  • 27. 01/18/15 Data Mining in Intrusion Detection 27 01/18/15University of Waikato27
  • 28. 01/18/15 Data Mining in Intrusion Detection 28 01/18/1528  Classifiers in WEKA are models for predicting nominal or numeric quantities  Implemented learning schemes include:  Decision trees and lists, instance-based classifiers, support vector machines, multi- layer perceptrons, logistic regression, Bayes’ nets, …
  • 29. 01/18/15 Data Mining in Intrusion Detection 29 01/18/15 University of Waikato 29
  • 30. 01/18/15 Data Mining in Intrusion Detection 30 01/18/15 University of Waikato 30
  • 31. 01/18/15 Data Mining in Intrusion Detection 31 01/18/15 University of Waikato 31
  • 32. 01/18/15 Data Mining in Intrusion Detection 32 01/18/15University of Waikato32
  • 33. 01/18/15 Data Mining in Intrusion Detection 33 01/18/15University of Waikato33
  • 34. 01/18/15 Data Mining in Intrusion Detection 34 01/18/15University of Waikato34
  • 35. 01/18/15 Data Mining in Intrusion Detection 35 01/18/15University of Waikato35
  • 36. 01/18/15 Data Mining in Intrusion Detection 36 01/18/15University of Waikato36
  • 37. 01/18/15 Data Mining in Intrusion Detection 37 01/18/15University of Waikato37
  • 38. 01/18/15 Data Mining in Intrusion Detection 38 01/18/15University of Waikato38
  • 39. 01/18/15 Data Mining in Intrusion Detection 39 01/18/15University of Waikato39
  • 40. 01/18/15 Data Mining in Intrusion Detection 40