A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems

碩士 === 大葉大學 === 資訊管理學系碩士班 === 91 === In recent years, along with the popularity of Internet, the pervasion of the computer usage and the maturity of the network technique, it makes Internet become the media of commercial transaction, and attract the attention from society. On the contrary, it also c...

Full description

Bibliographic Details
Main Authors: Lin Tung Sen, 林東森
Other Authors: Tsaur Woei Jiunn
Format: Others
Language:zh-TW
Published: 2003
Online Access:http://ndltd.ncl.edu.tw/handle/06667918325434921878
id ndltd-TW-091DYU00396036
record_format oai_dc
spelling ndltd-TW-091DYU003960362015-10-13T17:01:16Z http://ndltd.ncl.edu.tw/handle/06667918325434921878 A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems 應用有效的群集分析機制於入侵偵測系統之研究 Lin Tung Sen 林東森 碩士 大葉大學 資訊管理學系碩士班 91 In recent years, along with the popularity of Internet, the pervasion of the computer usage and the maturity of the network technique, it makes Internet become the media of commercial transaction, and attract the attention from society. On the contrary, it also causes hackers'' attacks and a variety of network crimes. The potential damage that caused by the intrusion is not only difficult to estimate, but expose the security problem existing in the system. The host-based intrusion detection system is to defend and detect attack behaviors from hacker via log files in the server. If we can analyze log files precisely and efficiently, it will be useful to establish an intrusion detection system. Therefore, in this thesis we mainly analyze log files by using clustering and classification methods to distinguish normal and abnormal behaviors. Although the clustering method can analyze huge log files, it generally needs to set up a known cluster number in advance before starting clustering; however, it is difficult for us to decide the known number. If we employ a cluster validity index to evaluate automatically the number of clusters, we can acquire better results. When the amount of log files are gradually added, clustering procedure needs to be run again. If we can adopt the advantage of classification, we can handle cumulative log files efficiently. Based on the requirements stated above, we integrate a faster clustering algorithm into the cluster validity index to solve the cluster analysis problems, and further use the classification rule of modified K-nearest neighbor to handle the increasingly cumulative log files. The results derived in this thesis can be used to construct the preceding part of an intrusion detection system. Furthermore, we also develop a practical system. Through this implemented system, we can cluster and classify log files, and validate the feasibility of the proposed methods in this thesis. Tsaur Woei Jiunn 曹偉駿 2003 學位論文 ; thesis 43 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大葉大學 === 資訊管理學系碩士班 === 91 === In recent years, along with the popularity of Internet, the pervasion of the computer usage and the maturity of the network technique, it makes Internet become the media of commercial transaction, and attract the attention from society. On the contrary, it also causes hackers'' attacks and a variety of network crimes. The potential damage that caused by the intrusion is not only difficult to estimate, but expose the security problem existing in the system. The host-based intrusion detection system is to defend and detect attack behaviors from hacker via log files in the server. If we can analyze log files precisely and efficiently, it will be useful to establish an intrusion detection system. Therefore, in this thesis we mainly analyze log files by using clustering and classification methods to distinguish normal and abnormal behaviors. Although the clustering method can analyze huge log files, it generally needs to set up a known cluster number in advance before starting clustering; however, it is difficult for us to decide the known number. If we employ a cluster validity index to evaluate automatically the number of clusters, we can acquire better results. When the amount of log files are gradually added, clustering procedure needs to be run again. If we can adopt the advantage of classification, we can handle cumulative log files efficiently. Based on the requirements stated above, we integrate a faster clustering algorithm into the cluster validity index to solve the cluster analysis problems, and further use the classification rule of modified K-nearest neighbor to handle the increasingly cumulative log files. The results derived in this thesis can be used to construct the preceding part of an intrusion detection system. Furthermore, we also develop a practical system. Through this implemented system, we can cluster and classify log files, and validate the feasibility of the proposed methods in this thesis.
author2 Tsaur Woei Jiunn
author_facet Tsaur Woei Jiunn
Lin Tung Sen
林東森
author Lin Tung Sen
林東森
spellingShingle Lin Tung Sen
林東森
A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
author_sort Lin Tung Sen
title A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
title_short A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
title_full A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
title_fullStr A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
title_full_unstemmed A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
title_sort study on applying effective cluster analysis schemes to intrusion detection systems
publishDate 2003
url http://ndltd.ncl.edu.tw/handle/06667918325434921878
work_keys_str_mv AT lintungsen astudyonapplyingeffectiveclusteranalysisschemestointrusiondetectionsystems
AT líndōngsēn astudyonapplyingeffectiveclusteranalysisschemestointrusiondetectionsystems
AT lintungsen yīngyòngyǒuxiàodeqúnjífēnxījīzhìyúrùqīnzhēncèxìtǒngzhīyánjiū
AT líndōngsēn yīngyòngyǒuxiàodeqúnjífēnxījīzhìyúrùqīnzhēncèxìtǒngzhīyánjiū
AT lintungsen studyonapplyingeffectiveclusteranalysisschemestointrusiondetectionsystems
AT líndōngsēn studyonapplyingeffectiveclusteranalysisschemestointrusiondetectionsystems
_version_ 1717777781335523328