【24h】

Effectively Identifying User Profiles in Network and Host Metrics

机译:有效地识别网络和主机指标中的用户配置文件

获取原文
获取原文并翻译 | 示例

摘要

This work presents a collection of methods that is used to effectively identify users of computers systems based on their particular usage of the software and the network. Not only are we able to identify individual computer users by their behavioral patterns, we are also able to detect significant deviations in their typical computer usage over time, or compared to a group of their peers. For instance, most people have a small, and relatively unique selection of regularly visited websites, certain email services, daily work hours, and typical preferred applications for mandated tasks. We argue that these habitual patterns are sufficiently specific to identify fully anonymized network users.rnWe demonstrate that with only a modest data collection capability, profiles of individual computer users can be constructed so as to uniquely identify a profiled user from among their peers. As time progresses and habits or circumstances change, the methods presented update each profile so that changes in user behavior can be reliably detected over both abrupt and gradual time frames, without losing the ability to identify the profiled user.rnThe primary benefit of our methodology allows one to efficiently detect deviant behaviors, such as subverted user accounts, or organizational policy violations. Thanks to the relative robustness, these techniques can be used in scenarios with very diverse data collection capabilities, and data privacy requirements. In addition to behavioral change detection, the generated profiles can also be compared against pre-defined examples of known adversarial patterns.
机译:这项工作提出了一些方法的集合,这些方法用于根据软件和网络的特定用法有效地识别计算机系统的用户。我们不仅能够通过他们的行为模式来识别单个计算机用户,而且还能够检测其典型计算机使用情况随时间推移或与一组同龄人相比的重大差异。例如,大多数人对定期访问的网站,某些电子邮件服务,每日工作时间以及用于任务授权的典型首选应用程序的选择相对较小且相对唯一。我们认为,这些惯用模式足以识别完全匿名的网络用户。我们证明,只有适度的数据收集功能,才能构建单个计算机用户的配置文件,以便从其同级中唯一地识别配置文件的用户。随着时间的推移以及习惯或环境的变化,本文介绍的方法会更新每个配置文件,以便可以在突然的和逐渐的时间范围内可靠地检测到用户行为的变化,而不会失去识别配置文件的用户的能力。一种有效检测异常行为的行为,例如颠覆的用户帐户或违反组织政策的行为。由于具有相对的鲁棒性,因此这些技术可用于具有非常多样化的数据收集功能和数据隐私要求的场景。除了行为变化检测之外,还可以将生成的配置文件与已知对抗模式的预定义示例进行比较。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号