DocumentCode :
2520350
Title :
Masquerade Detection in Network Environments
Author :
Strasburg, Chris ; Krishnan, Sandeep ; Dorman, Karin ; Basu, Samik ; Wong, Johnny S.
Author_Institution :
Ames Lab., Iowa State Univ. Ames, Ames, IA, USA
fYear :
2010
fDate :
19-23 July 2010
Firstpage :
38
Lastpage :
44
Abstract :
As reliance on Internet connected systems expands, the threat of damage from malicious actors, especially undetected actors, rises. Masquerade attacks, where one individual or system poses as another, are among the most harmful and difficult to detect types of intrusion. Previous efforts to detect masquerade attacks have focused on host-based approaches, including command line, system call, and GUI interaction profiling but when host data is not accessible or legal/ethical restrictions apply, these methods are infeasible. In this work, we present an approach to masquerade detection using only basic network statistics. We use server log analysis to tag network events with the associated user and build user network profiles By utilizing only antagonized summary data, we limit the privacy impact of masquerade detection while avoiding the data accessibility issues associated with host-based approaches. We compile 90 days of NetFlow data from over 50 users and show the user profile are unique, and likely useful for detecting masqueraders. Finally, we apply Support Vector Machine (SVM) classification to demonstrate feasibility of masquerade detection using network data.
Keywords :
Internet; data privacy; security of data; support vector machines; GUI interaction profiling; Internet connected system; anonymized summary data; command line; data accessibility; data privacy; graphical user interface; host based approache; masquerade detection; network environment; network statistics; server log analysis; support vector machine classification; system call; tag network; user network profile; Data models; Electronic mail; Hidden Markov models; IP networks; Support vector machines; Training; Training data; D.4.6. Security and Privacy Protection; H.1.2. User/Machine Systems; K.6.5. Security and Protection;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-7526-1
Electronic_ISBN :
978-0-7695-4107-5
Type :
conf
DOI :
10.1109/SAINT.2010.66
Filename :
5598177
Link To Document :
بازگشت