Presentation 2010-06-17
A data screening technique for network log data by frequent sequential pattern mining
Hisashi TSURUTA, Takayoshi SHOUDAI, Jun'ichi TAKEUCHI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) To early detect and defend the threats in the Internet caused by botnet, darknet monitoring is very important to understand various botnet activities. However, common illegal accesses by ordinary malwares makes such detection difficult. In this paper, in order to remove such accesses by ordinary malwares from the results of network monitoring, we propose a data screening method based on finding frequent sequential patterns which appear in given traffic data. Besides, we apply our method to traffic data observed in darknet and report the results.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Incident Detection / Frequent Pattern Mining / Sequential Pattern / Data Screening / Darknet Monitoring
Paper # IA2010-2,ICSS2010-2
Date of Issue

Conference Information
Committee IA
Conference Date 2010/6/10(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Internet Architecture(IA)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A data screening technique for network log data by frequent sequential pattern mining
Sub Title (in English)
Keyword(1) Incident Detection
Keyword(2) Frequent Pattern Mining
Keyword(3) Sequential Pattern
Keyword(4) Data Screening
Keyword(5) Darknet Monitoring
1st Author's Name Hisashi TSURUTA
1st Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)()
2nd Author's Name Takayoshi SHOUDAI
2nd Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
3rd Author's Name Jun'ichi TAKEUCHI
3rd Author's Affiliation Graduate School of Information Science and Electrical Engineering, Kyushu University:Institute of Systems, Information Technologies and Nanotechnologies (ISIT)
Date 2010-06-17
Paper # IA2010-2,ICSS2010-2
Volume (vol) vol.110
Number (no) 78
Page pp.pp.-
#Pages 6
Date of Issue