Practical User Identification for Masquerade Detection

被引:0
|
作者
Shim, Charlie Y. [1 ]
Kim, Jung Yeop [2 ]
Gantenbein, Rex E. [3 ]
机构
[1] Kutztown Univ Penn, Dept Comp Sci, Kutztown, PA 19530 USA
[2] Utica Coll, Dept Comp Sci, Utica, NY 13502 USA
[3] Univ Wyoming, Dept Comp Sci, Laramie, WY 82071 USA
关键词
intrusion detection systems; masquerade detection; normal profiles; support vector machines;
D O I
10.1109/WCECS.2008.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Masquerade detection discovers suspicious activities in a computer system by creating users' normal profiles, then raising an alert when the audited behavior does not fit. We propose to apply the SVM algorithm to the concurrently employed patterns that have been weighted according to their frequencies in order to identify masquerading attacks. Our approach not only reduces the complexity of the system but also is more robust in controlling noisy instances of the audited behavior.
引用
收藏
页码:47 / +
页数:3
相关论文
共 50 条
  • [1] Analysis of User Command Behavior and Masquerade Detection
    Huang, Shou-Hsuan Stephen
    Wu, Han-Ching
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 265 - 273
  • [2] Modeling User Search Behavior for Masquerade Detection
    Ben Salem, Malek
    Stolfo, Salvatore J.
    RECENT ADVANCES IN INTRUSION DETECTION, 2011, 6961 : 181 - 200
  • [3] Multi Application User Profiling for Masquerade Attack Detection
    Saljooghinejad, Hamed
    Rathore, Wilson Naik
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 676 - 684
  • [4] Experimenting with masquerade detection via user task usage
    Rodríguez J.
    Cañete L.
    Monroy R.
    Medina-Pérez M.A.
    International Journal on Interactive Design and Manufacturing, 2017, 11 (04) : 771 - 784
  • [5] Sequence-based masquerade detection for different user groups
    Sen, S.
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (07) : 1265 - 1278
  • [6] Recursive data mining for masquerade detection and author identification
    Szymanski, BK
    Zhang, YQ
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 424 - 431
  • [7] Masquerade detection based upon GUI user profiling in Linux systems
    Bhukya, Wilson Naik
    Kommuru, Suneel Kumar
    Negi, Atul
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 228 - 239
  • [8] User Behavior Analysis in Masquerade Detection Using Principal Component Analysis
    Wu, Han-Ching
    Huang, Shou-Hsuan Stephen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 1, PROCEEDINGS, 2008, : 201 - 206
  • [9] Towards Building a Masquerade Detection Method Based on User File System Navigation
    Camina, Benito
    Monroy, Raul
    Trejo, Luis A.
    Sanchez, Erika
    ADVANCES IN ARTIFICIAL INTELLIGENCE, PT I, 2011, 7094 : 174 - 186
  • [10] Modeling User Network Behavior Based on Network Packet Sketches for Masquerade Detection
    Lv, Zhiyuan
    Zhao, Youjian
    Li, Haibin
    2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2019, : 180 - 187