• DocumentCode
    424500
  • Title

    UNICORN: Misuse Detection for UNICOS ™

  • Author

    Christoph, G.G. ; Jackson, K.A. ; Neuman, M.C. ; Siciliano, C.L.B. ; Simmonds, D.D. ; Stallings, C.A. ; Thompson, J.L.

  • Author_Institution
    Los Alamos National Laboratory
  • fYear
    1995
  • fDate
    8-8 Dec. 1995
  • Firstpage
    56
  • Lastpage
    56
  • Abstract
    An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year and a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos´ main computing network, the ICN.
  • Keywords
    UNICOS; anomaly detection; auditing; computer misuse; computer security; hacking; intrusion detection; security logs; Computer hacking; Computer networks; Computer security; Information security; Intrusion detection; Laboratories; Network servers; Performance analysis; US Department of Energy; Workstations; UNICOS; anomaly detection; auditing; computer misuse; computer security; hacking; intrusion detection; security logs;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Supercomputing, 1995. Proceedings of the IEEE/ACM SC95 Conference
  • Conference_Location
    San Diego, CA, USA
  • Print_ISBN
    0-89791-816-9
  • Type

    conf

  • DOI
    10.1109/SUPERC.1995.241777
  • Filename
    1383193