Towards Building a Masquerade Detection Method Based on User File System Navigation

被引:0
|
作者
Camina, Benito [1 ]
Monroy, Raul [1 ]
Trejo, Luis A. [1 ]
Sanchez, Erika [1 ]
机构
[1] Tecnol Monterrey, Dept Comp Sci, Atizapan 52926, Estado De Mexic, Mexico
来源
关键词
INTRUSION;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Given that information is an extremely valuable asset, it is vital to timely detect whether one's computer (session) is being illegally seized by a masquerader. Masquerade detection has been actively studied for more than a decade, especially after the seminal work of Schonlau's group, who suggested that, to profile a user, one should model the history of the commands she would enter into a UNIX session. Schonlau's group have yielded a masquerade dataset, which has been the standard for comparing masquerade detection methods. However, the performance of these methods is not conclusive, and, as a result, research on masquerade detection has resorted to other sources of information for profiling user behaviour. In this paper, we show how to build an accurate user profile by looking into how the user structures her own file system and how she navigates such structure. While preliminary, our results are encouraging and suggest a number of ways in which new methods can be constructed.
引用
收藏
页码:174 / 186
页数:13
相关论文
共 50 条
  • [1] TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access Records
    Wang, Jiarong
    Cai, Lijun
    Yu, Aimin
    Zhu, Min
    Meng, Dan
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 360 - 371
  • [2] Building Robust Temporal User Profiles for Anomaly Detection in File System Accesses
    Mehnaz, Shagufta
    Bertino, Elisa
    2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
  • [3] ICA based blind multi-user detection method in CDMA navigation system
    Shang Junna
    Zhao Zhijin
    Wang Xiaorong
    SECOND INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY, PTS 1-3, 2007, 6795
  • [4] Building detection in augmented reality based navigation system
    Lee, Kisung
    Kim, Yongkwon
    Ch, Seong Ik
    Choi, Kyungho
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 544 - 551
  • [5] Sequence-based masquerade detection for different user groups
    Sen, S.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1265 - 1278
  • [6] Masquerade detection based upon GUI user profiling in Linux systems
    Bhukya, Wilson Naik
    Kommuru, Suneel Kumar
    Negi, Atul
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 228 - 239
  • [7] Personalized User Profiles-based Insider Threat Detection for Distributed File System
    Xin, Wu
    Shen, Qingni
    Feng, Ke
    Xia, Yutang
    Wu, Zhonghai
    Lin, Zhenghao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1441 - 1446
  • [8] Covariance Matrix Method Based Technique for Masquerade Detection
    Raveendran, Reshma
    Dhanya, K. A.
    2014 INTERNATIONAL CONFERENCE FOR CONVERGENCE OF TECHNOLOGY (I2CT), 2014,
  • [9] Modeling User Network Behavior Based on Network Packet Sketches for Masquerade Detection
    Lv, Zhiyuan
    Zhao, Youjian
    Li, Haibin
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 180 - 187
  • [10] Towards Building a Distributed File System for Remote Sensing Image Process
    Li, Zhenju
    Li, Xuejun
    Liu, Tao
    Xie, Jianwei
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA), 2016, : 311 - 314