首页> 外文OA文献 >Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems
【2h】

Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems

机译:在UNIX系统中使用基于分类法的多项建模方法伪装检测

摘要

This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that use a set of features to reveal user intent. The specific objective is to model user command profiles and detect deviations indicating a masquerade attack. The approach aims to model user intent, rather than only modeling sequences of user issued commands. We hypothesize that each individual user will search in a targeted and limited fashion in order to find information germane to their current task. Masqueraders, on the other hand, will likely not know the file system and layout of another user's desktop, and would likely search more extensively and broadly. Hence, modeling a user search behavior to detect deviations may more accurately detect masqueraders. To that end, we extend prior research that uses UNIX command sequences issued by users as the audit source by relying upon an abstraction of commands. We devised a taxonomy of UNIX commands that is used to abstract command sequences. The experimental results show that the approach does not lose information and performs comparably to or slightly better than the modeling approach based on simple UNIX command frequencies.
机译:本文介绍了基于Hellinger距离的一类和基于SVM的一类SVM建模技术,这些技术使用一组功能来揭示用户意图。具体目标是为用户命令配置文件建模,并检测表明伪装攻击的偏差。该方法旨在对用户意图进行建模,而不是仅对用户发出的命令序列进行建模。我们假设每个用户都将以有针对性的有限方式进行搜索,以找到与其当前任务密切相关的信息。另一方面,伪装者可能不知道其他用户桌面的文件系统和布局,并且可能会进行更广泛和更广泛的搜索。因此,对用户搜索行为进行建模以检测偏差可以更准确地检测伪装者。为此,我们扩展了以前的研究,即依靠命令的抽象将用户发布的UNIX命令序列用作审核源。我们设计了用于抽象命令序列的UNIX命令分类法。实验结果表明,该方法不会丢失信息,并且与基于简单UNIX命令频率的建模方法相比,其性能不亚于或略好于后者。

著录项

  • 作者单位
  • 年度 2008
  • 总页数
  • 原文格式 PDF
  • 正文语种 {"code":"en","name":"English","id":9}
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号