首页> 外文学位 >Statistical modeling of UNIX users and processes with application to computer intrusion detection.
【24h】

Statistical modeling of UNIX users and processes with application to computer intrusion detection.

机译:UNIX用户和进程的统计模型及其在计算机入侵检测中的应用。

获取原文
获取原文并翻译 | 示例

摘要

High-order Markov chain and rarity models are proposed for profiling UNIX users and processes to identify their “signature behaviors”. Sequences of shell commands and system calls are employed as the audit data stream for users and processes, respectively. The goal of monitoring is to detect potential intrusions by discovering irregularities in their behaviors.; Starting from a high-order Markov chain model, the first method evolves to a hybrid model which is based mostly on the Markov chain element and occasionally on a statistical-independence model. A procedure driven by Maximum Likelihood (ML) considerations is devised to estimate the model parameters as the profile of normal behavior. The formal ML estimates are numerically intractable, but the ML-optimization problem can be substituted by a linear inverse problem with positivity constraint (LIN-INPOS), for which the EM algorithm can be used as an equation solver to produce an approximate ML-estimate. The second method focuses on the “rarity” of short sequences of audit data which is measured by their relative usage frequencies. Individual commands (or system calls) as well as the transitions between them are taken into account to formulate scores. It requires little computing resource and can be easily implemented.; The intrusion detection system works by comparing a sequence of audit data to the corresponding estimated signature behaviors in real time through statistical hypothesis testing. A form of likelihood-ratio test is devised. In the case of user profiling, it is used to detect if a given sequence of commands is from the proclaimed user, with the alternative hypothesis being a masquerader. In the case of processes modeling we test if a target system-call trace is part of the execution of an intrusion program. Real-life data collected from AT&T Labs - Research and publicly available data from the university of New Mexico are utilized to assess the proposed approaches. The experiment results indicate that our models hold promise and opens the door for many exciting modifications and extensions for computer intrusion detection.
机译:提出了用于描述 UNIX 用户和过程以识别其“签名行为”的高阶Markov链和稀有模型。 Shell命令和系统调用的序列分别用作用户和进程的审核数据流。监视的目的是通过发现行为的不规则性来检测潜在的入侵。从高阶马尔可夫链模型开始,第一种方法演变为混合模型,该模型主要基于马尔可夫链元素,偶尔基于统计独立模型。设计了一个由最大似然(ML)考虑因素驱动的过程,以将模型参数作为正常行为的概况进行估算。形式上的ML估计值在数值上是难解的,但是ML优化问题可以用具有正约束的线性逆问题(LIN-INPOS)代替,为此,EM算法可以用作方程求解器以产生近似ML估计值。第二种方法侧重于短序列审计数据的“稀有性”,这是由它们的相对使用频率来衡量的。考虑各个命令(或系统调用)以及它们之间的转换以制定分数。它需要很少的计算资源,并且易于实现。入侵检测系统的工作原理是通过统计假设检验,将审核数据序列与相应的估计签名行为进行实时比较。设计了一种似然比检验形式。在用户配置文件的情况下,它用于检测给定的命令序列是否来自被声明的用户,替代假设是伪装的。在流程建模的情况下,我们测试目标系统调用跟踪是否是入侵程序执行的一部分。从AT&T Labs-Research收集的真实数据和新墨西哥大学的公开数据可用于评估所建议的方法。实验结果表明,我们的模型有望实现,并为计算机入侵检测的许多激动人心的修改和扩展打开了大门。

著录项

  • 作者

    Ju, Wen-Hua.;

  • 作者单位

    Rutgers The State University of New Jersey - New Brunswick.;

  • 授予单位 Rutgers The State University of New Jersey - New Brunswick.;
  • 学科 Statistics.; Computer Science.
  • 学位 Ph.D.
  • 年度 2000
  • 页码 109 p.
  • 总页数 109
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 统计学;自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号