Font Size: a A A

Audit data analysis and mining

Posted on:2002-06-17Degree:Ph.DType:Dissertation
University:George Mason UniversityCandidate:Wu, NingningFull Text:PDF
GTID:1468390011490426Subject:Computer Science
Abstract/Summary:
The need for intrusion detection systems that are able to monitor large amounts of audit trail data, detect intrusions quickly, and generate few false alarms is pressing. This work introduces a network anomaly detection system, Audit Data Analysis and Mining (ADAM), which uses a novel application of association rules and classification techniques to detect attacks using the network audit trail data. ADAM is able to detect network intrusions in real time with very low false alarm rate. One of its strongest contributions is the ability to detect novel attacks without dependency on the training data of attacks, due to a novel application of the pseudo-Bayes estimators technique.
Keywords/Search Tags:Data, Audit, Detect
Related items