Masquerade mimicry attack detection: A randomised approach

被引:14
|
作者
Tapiador, Juan E. [1 ]
Clark, John A. [1 ]
机构
[1] Univ York, Dept Comp Sci, York YO10 5GH, N Yorkshire, England
关键词
Anomaly detection; Insider threats; Masqueraders; Mimicry attacks; Kullback-Leibler divergence; INTRUSION DETECTION;
D O I
10.1016/j.cose.2011.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A masquerader is an (often external) attacker who, after succeeding in obtaining a legitimate user's credentials, attempts to use the stolen identity to carry out malicious actions. Automatic detection of masquerading attacks is generally undertaken by approaching the problem from an anomaly detection perspective: a model of normal behaviour for each user is constructed and significant departures from it are identified as potential masquerading attempts. One potential vulnerability of these schemes lies in the fact that anomaly detection algorithms are generally susceptible to deception. In this work, we first investigate how a resourceful masquerader can successfully evade detection while still accomplishing his goals. For this, we introduce the concept of masquerade mimicry attacks, consisting of carefully constructed attacks that are not identified as anomalous. We then explore two different detection schemes to thwart such attacks. We first study the introduction of a blind randomisation strategy into a baseline anomaly detector. We then propose a more accurate algorithm, called Probabilistic Padding Identification (PPI) and based on the Kullback-Leibler divergence, which attempts to identify if a sufficiently anomalous attack is present within an apparently normal behavioural pattern. Our experimental results indicate that the PPI algorithm achieves considerably better detection quality than both blind randomised strategies and adversarial-unaware approaches. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:297 / 310
页数:14
相关论文
共 50 条
  • [21] One-Time Passwords: Resistance to Masquerade Attack
    Babkin, Sergey
    Epishkina, Anna
    POSTPROCEEDINGS OF THE 9TH ANNUAL INTERNATIONAL CONFERENCE ON BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA 2018), 2018, 145 : 199 - 203
  • [22] Morphing Attack Detection: A Fusion Approach
    Lorenz, Siri
    Scherhag, Ulrich
    Rathgeb, Christian
    Busch, Christoph
    2021 IEEE 24TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2021, : 703 - 709
  • [23] Adversarial Attack Detection Approach for Intrusion Detection Systems
    Degirmenci, Elif
    Ozcelik, Ilker
    Yazici, Ahmet
    IEEE ACCESS, 2024, 12 : 195996 - 196009
  • [24] Masquerade Detection through GUIID
    Imsand, Eric S.
    Hamilton, John A., Jr.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [25] The masquerade game: marine mimicry adaptation between egg-cowries and octocorals
    Sanchez, Juan A.
    Fuentes-Pardo, Angela P.
    Ni Almhain, Ide
    Ardila-Espitia, Nestor E.
    Cantera-Kintz, Jaime
    Forero-Shelton, Manu
    PEERJ, 2016, 4
  • [26] Sequence alignment for masquerade detection
    Coull, Scott E.
    Szymanski, Boleslaw K.
    COMPUTATIONAL STATISTICS & DATA ANALYSIS, 2008, 52 (08) : 4116 - 4131
  • [27] Episode based masquerade detection
    Dash, SK
    Reddy, KS
    Pujari, AK
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 251 - 262
  • [28] A study of effectiveness in masquerade detection
    Bhukya, Wilson Naik
    Suresh, Kumar G.
    Negi, Atul
    TENCON 2006 - 2006 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2006, : 1983 - +
  • [30] Stochastic Game Approach for Replay Attack Detection
    Miao, Fei
    Pajic, Miroslav
    Pappas, George J.
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 1854 - 1859