Practical User Identification for Masquerade Detection

被引:0
|
作者
Shim, Charlie Y. [1 ]
Kim, Jung Yeop [2 ]
Gantenbein, Rex E. [3 ]
机构
[1] Kutztown Univ Penn, Dept Comp Sci, Kutztown, PA 19530 USA
[2] Utica Coll, Dept Comp Sci, Utica, NY 13502 USA
[3] Univ Wyoming, Dept Comp Sci, Laramie, WY 82071 USA
关键词
intrusion detection systems; masquerade detection; normal profiles; support vector machines;
D O I
10.1109/WCECS.2008.14
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Masquerade detection discovers suspicious activities in a computer system by creating users' normal profiles, then raising an alert when the audited behavior does not fit. We propose to apply the SVM algorithm to the concurrently employed patterns that have been weighted according to their frequencies in order to identify masquerading attacks. Our approach not only reduces the complexity of the system but also is more robust in controlling noisy instances of the audited behavior.
引用
收藏
页码:47 / +
页数:3
相关论文
共 50 条
  • [41] Applying Frequent Episode Algorithm to Masquerade Detection
    Yu, Feng
    Wang, Min
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS, PROCEEDINGS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2008, 15 : 495 - +
  • [42] Mean User-Text Agglomeration (MUTA): Practical User Representation and Visualization for Detection of Online Influence Operations
    Crothers, Evan
    Viktor, Herna
    Japkowicz, Nathalie
    COMPUTATIONAL DATA AND SOCIAL NETWORKS, CSONET 2021, 2021, 13116 : 305 - 318
  • [43] Integration of Face Detection and User Identification with Visual Speech Recognition
    Sagheer, Alaa
    Aly, Saleh
    NEURAL INFORMATION PROCESSING, ICONIP 2012, PT V, 2012, 7667 : 479 - 487
  • [44] Keystroke/Mouse Usage Based Emotion Detection and User Identification
    Shikder, Rayhan
    Rahaman, Sydur
    Afroze, Farzia
    Al Islam, A. B. M. Alim
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 96 - 104
  • [45] Mdlcompress for intrusion detection: Signature inference and masquerade attack
    Evans, Scott
    Eiland, Earl
    Markham, Stephen
    Impson, Jeremy
    Laczo, Adam
    2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 1652 - +
  • [46] Decoy Document Deployment for Effective Masquerade Attack Detection
    Ben Salem, Malek
    Stolfo, Salvatore J.
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2011, 6739 : 35 - 54
  • [47] Windows NT one-class masquerade detection
    Li, L
    Manikopoulos, CN
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 82 - 87
  • [48] Masquerade detection on GUI-based windows systems
    Agrawal, Arshi
    Stamp, Mark
    International Journal of Security and Networks, 2015, 10 (01) : 32 - 41
  • [49] Quantifying the User Experience: Practical Statistics for User Research
    Miller, Elisa
    TECHNICAL COMMUNICATION, 2013, 60 (02) : 161 - 162
  • [50] Masquerade detection using profile hidden Markov models
    Huang, Lin
    Stamp, Mark
    COMPUTERS & SECURITY, 2011, 30 (08) : 732 - 747