A Fuzzy Approach to User-level Intrusion Detection

被引:2
|
作者
Liu, Wei [1 ]
Mao, Yu [1 ]
Ci, Linlin [1 ]
Zhang, Fuquan [2 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Minjiang Univ, Fujian Prov Key Lab Informat Proc & Intelligent C, Fuzhou 350117, Peoples R China
关键词
User behavior; Command closeness; Masquerader detection; Trusted computing; Fuzzy logic; ANOMALY DETECTION; PCA;
D O I
10.1007/s40815-020-00947-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, researchers have focused on network level intrusion detection and program level intrusion detection to improve computer security. However, neither approach is foolproof. Typically, a successful attacker manifests in the form of the attacker becoming a user on the host either with elevated or normal user privileges. The reason for this situation is that current research and technology development have focused on external, not internal. At this point, user-level intrusion detection attempts to deter and curtail an attacker even after the system has been compromised. This paper proposed a novel method for anomaly detection of user behavior. Considering the complexity and fluctuation of user behavior, our method builds a finite automaton to profile the user's normal behavior with closeness of commands within patterns and timing sequence and frequency information between patterns. This allows discrete data used for training to have a holistic structure that allows for a more accurate expression of the normal behavior of the user. In the detection stage, our method builds a threat evaluation system using fuzzy logic. Experimental results on data sets of Purdue University, SEA and self-collected data show that an accurate, effective and efficient detection can be achieved using the proposed approach.
引用
收藏
页码:862 / 877
页数:16
相关论文
共 50 条
  • [1] A Fuzzy Approach to User-level Intrusion Detection
    Wei Liu
    Yu Mao
    Linlin Ci
    Fuquan Zhang
    International Journal of Fuzzy Systems, 2021, 23 : 862 - 877
  • [2] A new approach of user-level intrusion detection with command sequence-to-sequence model
    Liu, Wei
    Mao, Yu
    Ci, Linlin
    Zhang, Fuquan
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) : 5707 - 5716
  • [3] Fuzzy approach for intrusion detection based on user's commands
    Kudlacik, Przemyslaw
    Porwik, Piotr
    Wesolowski, Tomasz
    SOFT COMPUTING, 2016, 20 (07) : 2705 - 2719
  • [4] Fuzzy approach for intrusion detection based on user’s commands
    Przemysław Kudłacik
    Piotr Porwik
    Tomasz Wesołowski
    Soft Computing, 2016, 20 : 2705 - 2719
  • [5] A user-level approach to network attached storage
    Sohan, R
    Hand, S
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 108 - 114
  • [6] User-Level Twitter Sentiment Analysis with a Hybrid Approach
    Er, Meng Joo
    Liu, Fan
    Wang, Ning
    Zhang, Yong
    Pratama, Mahardhika
    ADVANCES IN NEURAL NETWORKS - ISNN 2016, 2016, 9719 : 426 - 433
  • [7] Probabilistic User-Level Opinion Detection on Online Social Networks
    Bhattacharjee, Kasturi
    Petzold, Linda
    SOCIAL INFORMATICS, SOCINFO 2014, 2014, 8851 : 309 - 325
  • [8] Learning with User-Level Privacy
    Levy, Daniel
    Sun, Ziteng
    Amin, Kareem
    Kale, Satyen
    Kulesza, Alex
    Mohri, Mehryar
    Suresh, Ananda Theertha
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [9] Flexible user-level scheduling
    Craig, D
    Polychronopoulos, C
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2000, : 93 - 98
  • [10] A Fuzzy Clustering Approach for Intrusion Detection
    Zeng, QingPeng
    Wu, ShuiXiu
    WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 728 - +