An Implementation of Mining Prototype System for Network Attack Analysis

KIPS Transactions on Software and Data Engineering, Vol. 11, No. 4, pp. 455-462, Apr. 2004
10.3745/KIPSTC.2004.11.4.455, Full Text:


Network attacks are various types with development of internet and are a new types. The existing intrusion detection systems need a lot of efforts and costs in order to detect and respond to unknown or modified attacks because of detection based on signatures of known attacks. In this paper, we present a design and implementation for mining prototype system to predict unknown or modified attacks through network protocol attributes analysis. In order to analyze attributes of network protocols, we use the association rule and the frequent episode. The collected network protocols are storing schema of TCP, UDP, ICMP and integrated type. We are generating rules that can predict the types of network attacks. Our mining prototype in the intrusion detection system aspect is useful for response against new attacks as extra tool.

Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.

Cite this article
[IEEE Style]
E. H. Kim, M. S. Shin and K. H. Ryu, "An Implementation of Mining Prototype System for Network Attack Analysis," KIPS Journal C (2001 ~ 2012) , vol. 11, no. 4, pp. 455-462, 2004. DOI: 10.3745/KIPSTC.2004.11.4.455.

[ACM Style]
Eun Hee Kim, Moon Sun Shin, and Keun Ho Ryu. 2004. An Implementation of Mining Prototype System for Network Attack Analysis. KIPS Journal C (2001 ~ 2012) , 11, 4, (2004), 455-462. DOI: 10.3745/KIPSTC.2004.11.4.455.