首页> 外文学位 >User behavioral modeling of web-based systems for continuous user authentication.
【24h】

User behavioral modeling of web-based systems for continuous user authentication.

机译:基于Web的系统的用户行为建模,以进行连续的用户身份验证。

获取原文
获取原文并翻译 | 示例

摘要

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used.;We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification.;We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.
机译:身份验证在我们与计算机,移动设备,Web等进行交互的过程中起着重要作用。身份验证的思想是在授予系统特权访问权限之前唯一地标识用户。例如,近年来,可以通过Internet和Intranet访问更多的公司信息和应用程序。许多员工在远程位置工作,需要访问安全的公司文件。在此期间,恶意或未经授权的用户可能会访问系统。因此,逻辑上应具有某种机制来检测登录用户是否是控制该用户会话的同一用户。因此,必须使用高度安全的身份验证方法。我们假设我们每个人在计算机系统的使用中都是唯一的。正是这种独特性使用户在使用Web软件时能够对其进行“连续认证”。为了监视用户行为,使用了n-gram模型来捕获用户与基于Web的软件的交互。这种统计语言模型实质上捕获了用户操作的序列和子序列,它们的顺序以及时间关系,从而通过提供每个用户通常的行为模型来使它们独特。然后在软件操作过程中对用户进行连续监视。与“正常行为”的较大偏差可能表明存在恶意或意外行为。此方法在称为“入侵者检测器(ID)”的系统中实现,该系统可对用户行为进行建模,以体现在响应用户行为而生成的Web日志中。通过Web日志进行用户识别是经济高效且非侵入性的。我们在具有大约4000个用户的Web日志的大型现场系统上进行实验。对于这些实验,我们使用两种分类技术:二进制和多类分类;;我们基于粗粒度(即角色)和细粒度(即个体)分析评估特定于模型的用户行为差异。一组特定的指标用于提供有关每个模型如何执行的有价值的见解。识别合法用户和用户类型时,Intruder Detector可获得准确的结果。该工具还能够以最佳性能检测基于角色的用户行为中的异常值。除Web应用程序外,此连续监视技术还可与其他基于用户的系统一起使用,例如移动设备和网络流量分析。

著录项

  • 作者

    Milton, Leslie C.;

  • 作者单位

    University of Maryland, College Park.;

  • 授予单位 University of Maryland, College Park.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2015
  • 页码 105 p.
  • 总页数 105
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

  • 入库时间 2022-08-17 11:52:42

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号