• DocumentCode
    446480
  • Title

    A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior

  • Author

    Yurcik, William ; Liu, Chao

  • Author_Institution
    Nat. Center for Supercomput. Applications, Illinois Univ., Urbana-Champaign, IL, USA
  • Volume
    1
  • fYear
    2005
  • fDate
    9-12 May 2005
  • Firstpage
    111
  • Abstract
    Recent attacks enabled by stolen authentication passwords and keys have allowed intruders to masquerade as legitimate users on high performance computing clusters. With the motivation of detecting masqueraders on clusters, this work seeks to discriminate different types of users based on their command behavior - in particular, user command behavior on a multi-user public machine versus user command behavior on a high performance computing cluster. Our intuition is that these users act differently and the unique high performance cluster environment is constrained such that command behavior discrimination is enhanced versus enterprise environments. We formalize this into a classification problem to be solved by a support vector machine with TF-IDF feature construction techniques from the field of Information Retrieval. We present results showing the effectiveness of this approach exhibiting high precision depending on the length of monitoring in both time and number of commands. In particular we show that as few as 10 commands may be enough to recognize a masquerading attacker on a high performance computing cluster.
  • Keywords
    authorisation; workstation clusters; HPC cluster environments; SSH identity theft detection; TF-IDF feature construction; cluster security; command behavior discrimination; high performance computing clusters; information retrieval; masquerader discrimination; multiuser public machine; stolen authentication passwords; support vector machine; Authentication; Chaos; High performance computing; Information retrieval; Inspection; Monitoring; Performance analysis; Security; Support vector machine classification; Support vector machines;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cluster Computing and the Grid, 2005. CCGrid 2005. IEEE International Symposium on
  • Print_ISBN
    0-7803-9074-1
  • Type

    conf

  • DOI
    10.1109/CCGRID.2005.1558542
  • Filename
    1558542