Recursive data mining for masquerade detection and author identification

被引:27
|
作者
Szymanski, BK [1 ]
Zhang, YQ [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Comp Sci, Troy, NY 12180 USA
关键词
masquerade detection; author identification; recursive data mining; one-class SVM; intrusion detection;
D O I
10.1109/IAW.2004.1437848
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel recursive data mining method based on the simple but powerful model of cognition called a conceptor is introduced and applied to computer security. The method recursively mines a string of symbols by finding frequent patterns, encoding them with unique symbols and rewriting the string using this new coding. We apply this technique to two related but important problems in computer security: (i) masquerade defection to prevent a security attack in which an intruder impersonates a legitimate user to gain access to the resources, and (U) author identification, in which anonymous or disputed computer session needs to be attributed to one of a set of potential authors. Many methods based on automata theory, Hidden Markov Models, Bayesian models or even matching algorithms from bioinformatics have been proposed to solve the masquerading detection problem but less work has been done on the author identification. We used recursive data mining to characterize the structure and high-level symbols in user signatures and the monitored sessions. We used one-class SVM to measure the similarity of these two characterizations. We applied weighting prediction scheme to author identification. On the SEA dataset that we used in our experiments, the results were very promising.
引用
收藏
页码:424 / 431
页数:8
相关论文
共 50 条
  • [1] Practical User Identification for Masquerade Detection
    Shim, Charlie Y.
    Kim, Jung Yeop
    Gantenbein, Rex E.
    WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS, 2009, : 47 - +
  • [2] Data Mining based CIDS: Cloud Intrusion Detection System for Masquerade Attacks [DCIDSM]
    Pratik, Jain P.
    Madhu, B. R.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [3] Masquerade Detection Using Command Prediction and Association Rules Mining
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 552 - 559
  • [4] Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations
    Orebaugh, Angela
    Allnutt, Jeremy
    DIGITAL FORENSICS AND CYBER CRIME, 2010, 31 : 99 - +
  • [5] Canonical variates for recursive partitioning in data mining
    Cappelli, C
    Conversano, C
    COMPSTAT 2002: PROCEEDINGS IN COMPUTATIONAL STATISTICS, 2002, : 213 - 218
  • [6] IMA: Identification of Multi-author Student Assignment Submissions Using a Data Mining Approach
    Burn-Thornton, Kathryn
    Burman, Tim
    DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 136 - 141
  • [7] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [8] Crime detection and criminal identification in India using data mining techniques
    Tayal D.K.
    Jain A.
    Arora S.
    Agarwal S.
    Gupta T.
    Tyagi N.
    AI and Society, 2014, 30 (01): : 117 - 127
  • [9] On fault detection based on recursive subspace identification
    Oku, H
    SYSTEMS AND HUMAN SCIENCE - FOR SAFETY, SECURITY AND DEPENDABILITY, 2005, : 173 - +
  • [10] Change detection in the dynamics with recursive subspace identification
    Oku, H
    Nijsse, G
    Verhaegen, M
    Verdult, V
    PROCEEDINGS OF THE 40TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-5, 2001, : 2297 - 2302