Title :
Using artificial anomalies to detect unknown and known network intrusions
Author :
Fan, Wei ; Miller, Matthew ; Stolfo, Salvatore J. ; Lee, Wenke ; Chan, Philip K.
Author_Institution :
IBM Thomas J. Watson Res. Center, Hawthorne, NY, USA
Abstract :
Intrusion detection systems (IDSs) must be capable of detecting new and unknown attacks, or anomalies. We study the problem of building detection models for both pure anomaly detection and combined misuse and anomaly detection (i.e., detection of both known and unknown intrusions). We propose an algorithm to generate artificial anomalies to coerce the inductive learner into discovering an accurate boundary between known classes (normal connections and known intrusions) and anomalies. Empirical studies show that our pure anomaly detection model trained using normal and artificial anomalies is capable of detecting more than 77% of all unknown intrusion classes with more than. 50% accuracy per intrusion class. The combined misuse and anomaly detection models are as accurate as a pure misuse detection model in detecting known intrusions and are capable of detecting at least 50% of unknown intrusion classes with accuracy measurements between 75% and 100% per class
Keywords :
computer network management; security of data; artificial anomalies; combined misuse/anomaly detection; inductive learner; intrusion detection systems; known network intrusion detection; pure anomaly detection; unknown network intrusion detection; Computer science; Data analysis; Educational institutions; Event detection; Government; Intrusion detection; Machine learning algorithms; Pattern matching; Training data; Web and internet services;
Conference_Titel :
Data Mining, 2001. ICDM 2001, Proceedings IEEE International Conference on
Conference_Location :
San Jose, CA
Print_ISBN :
0-7695-1119-8
DOI :
10.1109/ICDM.2001.989509