Masquerade mimicry attack detection: A randomised approach

被引:14
|
作者
Tapiador, Juan E. [1 ]
Clark, John A. [1 ]
机构
[1] Univ York, Dept Comp Sci, York YO10 5GH, N Yorkshire, England
关键词
Anomaly detection; Insider threats; Masqueraders; Mimicry attacks; Kullback-Leibler divergence; INTRUSION DETECTION;
D O I
10.1016/j.cose.2011.05.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A masquerader is an (often external) attacker who, after succeeding in obtaining a legitimate user's credentials, attempts to use the stolen identity to carry out malicious actions. Automatic detection of masquerading attacks is generally undertaken by approaching the problem from an anomaly detection perspective: a model of normal behaviour for each user is constructed and significant departures from it are identified as potential masquerading attempts. One potential vulnerability of these schemes lies in the fact that anomaly detection algorithms are generally susceptible to deception. In this work, we first investigate how a resourceful masquerader can successfully evade detection while still accomplishing his goals. For this, we introduce the concept of masquerade mimicry attacks, consisting of carefully constructed attacks that are not identified as anomalous. We then explore two different detection schemes to thwart such attacks. We first study the introduction of a blind randomisation strategy into a baseline anomaly detector. We then propose a more accurate algorithm, called Probabilistic Padding Identification (PPI) and based on the Kullback-Leibler divergence, which attempts to identify if a sufficiently anomalous attack is present within an apparently normal behavioural pattern. Our experimental results indicate that the PPI algorithm achieves considerably better detection quality than both blind randomised strategies and adversarial-unaware approaches. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:297 / 310
页数:14
相关论文
共 50 条
  • [41] Using feedback to improve masquerade detection
    Yung, KH
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 48 - 62
  • [42] Masquerade detection by using activity patterns
    Reshmi, BM
    Manvi, SS
    EC2ND 2005, PROCEEDINGS, 2006, : 241 - +
  • [43] Uveitis masquerade syndromes: An approach to diagnosis
    Lin, Ming Lee
    Hall, Anthony J.
    CLINICAL AND EXPERIMENTAL OPHTHALMOLOGY, 2024, 52 (01): : 91 - 105
  • [44] Masquerade detection augmented with error analysis
    Maxion, RA
    Townsend, TN
    IEEE TRANSACTIONS ON RELIABILITY, 2004, 53 (01) : 124 - 147
  • [45] Masquerade Detection Using String Kernels
    Yang, Min
    Zhang, Huanguo
    Cai, H. J.
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 3681 - +
  • [46] GUI usage analysis for masquerade detection
    Imsand, Eric S.
    Hamilton, John A., Jr.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 270 - +
  • [47] Practical User Identification for Masquerade Detection
    Shim, Charlie Y.
    Kim, Jung Yeop
    Gantenbein, Rex E.
    WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS, 2009, : 47 - +
  • [48] Masquerade detection via customized grammars
    Latendresse, M
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 141 - 159
  • [49] Anagram: A content anomaly detector resistant to mimicry attack
    Wang, Ke
    Parekh, Janak J.
    Stolfo, Salvatore J.
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2006, 4219 : 226 - 248
  • [50] Fuzzy preference approach for computer network attack detection
    Manic, M
    Wilamowski, B
    IJCNN'01: INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, PROCEEDINGS, 2001, : 1345 - 1349