【24h】

Detecting Masqueraders by Profiling User Behaviors

机译:通过分析用户行为来检测伪装者

获取原文

摘要

Insider attack is a serious threat to enterprises, organizations and countries. It has become a widely studied topic in the field of information security. This paper mainly aims to effectively detect masqueraders by profiling user behaviors with keystroke and network traffic. The fly-time of digraph is employed to build users' keystroke behavior. User network behavior is modeled with statistic and text features that are extracted from network traffic. The K-Means classifier is used to classify network traffic, and different classification results are mapped to different user operations accordingly. Extensive experimental result shows that, in the case of users' keystroke models, the detection rate is achieved from 77% to 87.5% and the false alarm rate is 0.44 %. When we use network models, the detection rate is 100% with the false alarm rate as 0.05%. In conclusion, network traffic can describe user network behaviors precisely, while the detection rate of user keystroke behaviors suffers from the insufficient user input from keyboard. It is obvious that a certain masquerader detection mechanism which is based on specific user behaviors, cannot reach satisfied results since the corresponding data is insufficient in different scenarios. It is necessary to use both two type of behaviors for different scenarios to achieve a better detection result.
机译:内部攻击是对企业,组织和国家的严重威胁。它已成为信息安全领域中广泛研究的话题。本文的主要目的是通过使用击键和网络流量来分析用户行为,从而有效地检测伪装者。图的飞行时间用于建立用户的击键行为。用户网络行为使用从网络流量中提取的统计信息和文本功能进行建模。 K-Means分类器用于对网络流量进行分类,并且不同的分类结果会相应地映射到不同的用户操作。大量的实验结果表明,在用户按键模式下,检出率从77%提高到87.5%,误报率为0.44%。当我们使用网络模型时,检测率为100%,误报率为0.05%。总之,网络流量可以精确地描述用户网络行为,而用户键盘行为的检测率却受到来自键盘的用户输入不足的困扰。显然,基于特定用户行为的某种伪装检测机制无法获得令人满意的结果,因为相应的数据在不同的情况下是不够的。有必要针对不同场景同时使用两种行为,以实现更好的检测结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号