Layered security architecture for masquerade attack detection

作者: Hamed Saljooghinejad , Wilson Naik Bhukya

DOI: 10.1007/978-3-642-31540-4_19

关键词:

摘要: Masquerade attack refers to an that uses a fake identity, gain unauthorized access personal computer information through legitimate identification. Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior. If user's profile deviates their original behavior, it could potentially signal ongoing masquerade attack. In this paper we proposed new framework capture data in comprehensive manner collecting different layers across multiple applications. Our approach generates feature vectors which contain the output gained analysis such as Window Data, Mouse Keyboard Command Line File Access Data and Authentication Data. We evaluated our several experiments with number participants. experimental results show better detection rates acceptable false positives none earlier approaches has achieved level accuracy so far.

参考文章(17)
Hamed Saljooghinejad, Wilson Naik Rathore, Multi Application User Profiling for Masquerade Attack Detection advances in computing and communications. pp. 676- 684 ,(2011) , 10.1007/978-3-642-22714-1_70
Terran Lane, Carla E Brodley, An Application of Machine Learning to Anomaly Detection ,(1999)
H. Podell, Marshall D. Abrams, Computer and Network Security Computer Educators, Incorporated. ,(1987)
Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi, Masquerade detection based upon GUI user profiling in linux systems ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security. pp. 228- 239 ,(2007) , 10.1007/978-3-540-76929-3_21
Yehuda Vardi, Martin Theusan, Alan F. Karr, Wen-Hua Ju, William DuMouchel, Matthias Schonlau, Computer Intrusion: Detecting Masquerades Statistical Science. ,vol. 16, pp. 58- 74 ,(2001) , 10.1214/SS/998929476
Maja Pusara, Carla E. Brodley, User re-authentication via mouse movements visualization for computer security. pp. 1- 8 ,(2004) , 10.1145/1029208.1029210
Thorsten Joachims, Transductive Inference for Text Classification using Support Vector Machines international conference on machine learning. pp. 200- 209 ,(1999)
Eric S Imsand, John A Hamilton, GUI Usage Analysis for Masquerade Detection information assurance and security. pp. 270- 276 ,(2007) , 10.1109/IAW.2007.381943
A. Garg, R. Rahalkar, S. Upadhyaya, K. Kwiat, Profiling Users in GUI Based Systems for Masquerade Detection Information Assurance Workshop, 2006 IEEE. pp. 48- 54 ,(2006) , 10.1109/IAW.2006.1652076
R.A. Maxion, T.N. Townsend, Masquerade detection using truncated command lines dependable systems and networks. pp. 219- 228 ,(2002) , 10.1109/DSN.2002.1028903