Masquerade mimicry attack detection: A randomised approach

被引:14
|
作者
Tapiador, Juan E. [1 ]
Clark, John A. [1 ]
机构
[1] Univ York, Dept Comp Sci, York YO10 5GH, N Yorkshire, England
关键词
Anomaly detection; Insider threats; Masqueraders; Mimicry attacks; Kullback-Leibler divergence; INTRUSION DETECTION;
D O I
10.1016/j.cose.2011.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A masquerader is an (often external) attacker who, after succeeding in obtaining a legitimate user's credentials, attempts to use the stolen identity to carry out malicious actions. Automatic detection of masquerading attacks is generally undertaken by approaching the problem from an anomaly detection perspective: a model of normal behaviour for each user is constructed and significant departures from it are identified as potential masquerading attempts. One potential vulnerability of these schemes lies in the fact that anomaly detection algorithms are generally susceptible to deception. In this work, we first investigate how a resourceful masquerader can successfully evade detection while still accomplishing his goals. For this, we introduce the concept of masquerade mimicry attacks, consisting of carefully constructed attacks that are not identified as anomalous. We then explore two different detection schemes to thwart such attacks. We first study the introduction of a blind randomisation strategy into a baseline anomaly detector. We then propose a more accurate algorithm, called Probabilistic Padding Identification (PPI) and based on the Kullback-Leibler divergence, which attempts to identify if a sufficiently anomalous attack is present within an apparently normal behavioural pattern. Our experimental results indicate that the PPI algorithm achieves considerably better detection quality than both blind randomised strategies and adversarial-unaware approaches. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:297 / 310
页数:14
相关论文
共 50 条
  • [1] Online masquerade detection resistant to mimicry
    Maestre Vidal, Jorge
    Sandoval Orozco, Ana Lucila
    Garcia Villalba, Luis Javier
    EXPERT SYSTEMS WITH APPLICATIONS, 2016, 61 : 162 - 180
  • [2] Layered Security Architecture for Masquerade Attack Detection
    Saljooghinejad, Hamed
    Bhukya, Wilson Naik
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 255 - 262
  • [3] An EvABCD Approach For Masquerade Detection
    Shemla, A.
    Bineesh, V
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 533 - 537
  • [4] Mdlcompress for intrusion detection: Signature inference and masquerade attack
    Evans, Scott
    Eiland, Earl
    Markham, Stephen
    Impson, Jeremy
    Laczo, Adam
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 1652 - +
  • [5] Decoy Document Deployment for Effective Masquerade Attack Detection
    Ben Salem, Malek
    Stolfo, Salvatore J.
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 35 - 54
  • [6] Multi Application User Profiling for Masquerade Attack Detection
    Saljooghinejad, Hamed
    Rathore, Wilson Naik
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 676 - 684
  • [7] On the use of word networks to mimicry attack detection
    Godinez, Fernando
    Hutter, Dieter
    Monroy, Raul
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 423 - 435
  • [8] Comparative evaluation of different classification techniques for masquerade attack detection
    Elmasry W.
    Akbulut A.
    Zaim A.H.
    International Journal of Information and Computer Security, 2020, 13 (02) : 187 - 209
  • [9] Evolutionary implications of deception in mimicry and masquerade
    Nelson, Ximena J.
    CURRENT ZOOLOGY, 2014, 60 (01) : 6 - 15
  • [10] A Deep Learning Based Framework for Cloud Masquerade Attack Detection
    Xu, Shuting
    Lai, Shuhua
    Li, Yongjian
    2018 IEEE 37TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2018,