...
首页> 外文期刊>Journal of software >Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques
【24h】

Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques

机译:基于数据挖掘和软计算技术的伪装者入侵检测

获取原文
           

摘要

Many organizations face the critical threat of inside attacks from masqueraders who can be either disgruntled employees or external hackers by exploit legitimate user identity to manipulate the system. Intrusion detection systems (IDSs) are deployed to build the normal user profiles and then detect the possible deviation from the past behavior patterns indicating a possible illegal access. In this paper, we apply a profiling method based on user command sequences and apply the data mining technique Naïve Bayes classification to measure the degree of deviation. A fuzzy system is applied to integrate multiple commands execution to evaluate the overall threat of the possible masquerader existence.
机译:许多组织面临着伪装者内部攻击的严重威胁,这些伪装者可以利用合法的用户身份来操纵系统,从而成为不满的员工或外部黑客。部署入侵检测系统(IDS)来构建普通用户配置文件,然后检测与过去行为模式的可能偏差,以表明可能存在非法访问。在本文中,我们应用了一种基于用户命令序列的分析方法,并应用了数据挖掘技术朴素贝叶斯分类法来测量偏差程度。应用模糊系统来集成多个命令执行,以评估可能存在的伪装者的总体威胁。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号