首页> 外文会议>International Conference on Systems and Informatics >Improved Detection of User Malicious Behavior through Log Mining based on IHMM
【24h】

Improved Detection of User Malicious Behavior through Log Mining based on IHMM

机译:通过基于IHMM的日志挖掘改进了对用户恶意行为的检测

获取原文

摘要

In the intelligence community, the presence of malicious insiders poses a severe threat to information security and any decision relying on such information. In this paper, we propose a novel methodology that detects malicious people who attempt to destroy internal security through a certain malicious operation. This detection method relies on each user's working style, which we assume to be consistent from task to task. No matter security audit, intrusion detection or other abnormal behavior mining, it is static. Most of them use pattern matching and rely on average ratios, which not only neglect the characteristics of network but also cannot show the entire process dynamically. The internal rules of many network operations are cryptic, and the frequency of them in different time periods are different. If the frequency, measured by each index of one certain period, is directly used to measure that of the other periods, the result is likely to be inaccurate. Many documents believed that the network behavior data has the continuity and regularity in time, which can be described as a set of time-varying discrete data sequences. Therefore, we use the improved Hidden Markov Model(IHMM) to construct dynamic transformation of network behavior. After sets of off-line sample data are used to identify abnormal behaviors and normal behaviors, the algorithm has a higher correct rate, and the overall audit system has better performance.
机译:在情报界,恶意内部人员的存在对信息安全和任何依赖于此类信息的决策都构成了严重威胁。在本文中,我们提出了一种新颖的方法,可以检测企图通过某种恶意操作破坏内部安全性的恶意人员。这种检测方法依赖于每个用户的工作方式,我们认为这在任务之间是一致的。无论安全审核,入侵检测或其他异常行为挖掘,它都是静态的。他们中的大多数使用模式匹配并依靠平均比率,这不仅忽略了网络的特性,而且无法动态显示整个过程。许多网络操作的内部规则都是秘密的,并且它们在不同时间段的频率是不同的。如果将某个时间段的每个指标测得的频率直接用于测量其他时间段的频率,则结果很可能是不准确的。许多文档认为网络行为数据具有时间上的连续性和规律性,可以将其描述为一组随时间变化的离散数据序列。因此,我们使用改进的隐马尔可夫模型(IHMM)构造网络行为的动态转换。在使用离线样本数据集识别异常行为和正常行为之后,该算法具有较高的正确率,并且整个审计系统具有更好的性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号