CFP last date
20 May 2024
Reseach Article

Intrusion Detection System using Log Files and Reinforcement Learning

by Bhagyashree Deokar, Ambarish Hazarnis
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 45 - Number 19
Year of Publication: 2012
Authors: Bhagyashree Deokar, Ambarish Hazarnis
10.5120/7026-9675

Bhagyashree Deokar, Ambarish Hazarnis . Intrusion Detection System using Log Files and Reinforcement Learning. International Journal of Computer Applications. 45, 19 ( May 2012), 28-35. DOI=10.5120/7026-9675

@article{ 10.5120/7026-9675,
author = { Bhagyashree Deokar, Ambarish Hazarnis },
title = { Intrusion Detection System using Log Files and Reinforcement Learning },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 45 },
number = { 19 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 28-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume45/number19/7026-9675/ },
doi = { 10.5120/7026-9675 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:38:01.001372+05:30
%A Bhagyashree Deokar
%A Ambarish Hazarnis
%T Intrusion Detection System using Log Files and Reinforcement Learning
%J International Journal of Computer Applications
%@ 0975-8887
%V 45
%N 19
%P 28-35
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

World Wide Web is widely accessed by people for accessing services, social networking and so on. All these activities of users are traced in different types of log files. Hence, log files prove to be extremely useful in understanding user behavior, improving server performance, improving cache replacement policy, intrusion detection, etc. In this paper, we focus on the intrusion detection application of log files. By analyzing drawbacks and advantages of existing intrusion detection techniques, the paper proposes an intrusion detection system that attempts to minimize drawbacks of existing intrusion detection techniques, viz. false alarm rate and inability to detect unknown attacks. To accomplish this, association rule learning, reinforcement learning and log correlation techniques have been used collaboratively

References
  1. Tesink, S. (2007). Improving Intrusion Detection Systems through Machine Learning. Group, (07).
  2. Cramer, M. L. , Cannady, J. , & Harrell, J. (1996). New Methods of Intrusion Detection using Control-Loop Measurement. Information Systems Security, 1-10.
  3. Abad, C. , Taylor, J. , & Rowe, K. (n. d. ). Log Correlation for Intrusion Detection?: A Proof of Concept Systems Research.
  4. Paper, W. (n. d. ). Firewalls – Overview and Best Practices. Information Systems.
  5. Kerkhofs, J. , &Pannemans, D. (2001). Web Usage Mining on Proxy Servers?: A Case Study.
  6. Ning, P. , & Carolina, N. (n. d. ). Intrusion Detection Techniques. Bernoulli.
  7. Booth, D. , & Jansen, B. J. (n. d. ). A Review of Methodologies for Analyzing Websites, 141-162.
  8. Zhang, C. , Zhang, G. , & Sun, S. (2009). A Mixed Unsupervised Clustering-Based Intrusion Detection Model. 2009 Third International Conference on Genetic and Evolutionary Computing, 426-428. Ieee. doi:10. 1109/WGEC. 2009. 72
  9. Salama, S. E. , I. Marie, M. , El-Fangary, L. M. , & K. Helmy, Y. (2011). Web Server Logs Preprocessing for Web Intrusion Detection. Computer and Information Science, 4(4), 123-133. doi:10. 5539/cis. v4n4p123
  10. Brugger, S. T. (n. d. ). Data Mining Methods for Network Intrusion Detection, V, 1-35.
Index Terms

Computer Science
Information Sciences

Keywords

Association Rule Learning Log Correlation Log Files Reinforcement Learning Intrusion Detection Systems