Paper
28 March 2005 An enhanced stream mining approach for network anomaly detection
Author Affiliations +
Abstract
Network anomaly detection is one of the hot topics in the market today. Currently, researchers are trying to find a way in which machines could automatically learn both normal and anomalous behavior and thus detect anomalies if and when they occur. Most important applications which could spring out of these systems is intrusion detection and spam mail detection. In this paper, the primary focus on the problem and solution of “real time” network intrusion detection although the underlying theory discussed may be used for other applications of anomaly detection (like spam detection or spy-ware detection) too. Since a machine needs a learning process on its own, data mining has been chosen as a preferred technique. The object of this paper is to present a real time clustering system; we call Enhanced Stream Mining (ESM) which could analyze packet information (headers, and data) to determine intrusions.
© (2005) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Abdelghani Bellaachia and Rajat Bhatt "An enhanced stream mining approach for network anomaly detection", Proc. SPIE 5812, Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, (28 March 2005); https://doi.org/10.1117/12.611168
Lens.org Logo
CITATIONS
Cited by 1 scholarly publication.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Mining

Data mining

Data modeling

Computer intrusion detection

Electronic support measures

Analytical research

Artificial intelligence

RELATED CONTENT

A review of contrast pattern based data mining
Proceedings of SPIE (July 06 2015)
Connecting the dots to disconnect them a study into...
Proceedings of SPIE (January 13 2006)
Association rule mining in intrusion detection systems
Proceedings of SPIE (April 15 2004)
Web usage data mining agent
Proceedings of SPIE (March 12 2002)
Data mining model and algorithm in IDS
Proceedings of SPIE (April 15 2004)

Back to Top