【24h】

Detecting Masqueraders by Profiling User Behaviors

机译:通过分析用户行为来检测伪装者

获取原文

摘要

Insider attack is a serious threat to enterprises, organizations and countries. It has become a widely studied topic in the field of information security. This paper mainly aims to effectively detect masqueraders by profiling user behaviors with keystroke and network traffic. The fly-time of digraph is employed to build users' keystroke behavior. User network behavior is modeled with statistic and text features that are extracted from network traffic. The K-Means classifier is used to classify network traffic, and different classification results are mapped to different user operations accordingly. Extensive experimental result shows that, in the case of users' keystroke models, the detection rate is achieved from 77% to 87.5% and the false alarm rate is 0.44 %. When we use network models, the detection rate is 100% with the false alarm rate as 0.05%. In conclusion, network traffic can describe user network behaviors precisely, while the detection rate of user keystroke behaviors suffers from the insufficient user input from keyboard. It is obvious that a certain masquerader detection mechanism which is based on specific user behaviors, cannot reach satisfied results since the corresponding data is insufficient in different scenarios. It is necessary to use both two type of behaviors for different scenarios to achieve a better detection result.
机译:内幕攻击是对企业,组织和国家的严重威胁。它已成为信息安全领域的广泛研究主题。本文主要旨在通过用击键和网络流量来分析用户行为有效地检测伪装体。数字的飞行时间用于构建用户的击键行为。用户网络行为与从网络流量中提取的统计和文本功能进行建模。 K-means分类器用于对网络流量进行分类,并且不同的分类结果相应地映射到不同的用户操作。广泛的实验结果表明,在用户击键模型的情况下,检测率从77%到87.5%实现,错误报警速率为0.44%。当我们使用网络模型时,检出率为100%,误报率为0.05%。总之,网络流量可以精确地描述用户网络行为,而用户击键行为的检测率遭受来自键盘的不充分的用户输入。显而易见的是,基于特定用户行为的某个伪装检测机制无法达到满足结果,因为相应的数据在不同场景中不足。有必要使用两种类型的不同场景行为来实现更好的检测结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号