(An) approach to masquerade detection using support vector machineSupport vector machine 기반의 신분위장 탐지기법

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 480
  • Download : 0
Masqueraders who impersonate other users pose serious threat to computer security. Unfortunately, firewalls or misuse-based intrusion detection systems are generally ineffective in masquerade detection. Although anomaly detection techniques have long been considered an effective approach to complement misuse detection techniques, they are not widely used in practice due to poor accuracy and relatively high degree of false alarms. In this paper, we performed an empirical study investigating the effectiveness of Sup-port Vector Machine (SVM) in detecting masquerade activities using two different UNIX command sets. Concept of "common commands" was introduced as a feature to more effectively reflect diverse command patterns exhibited by various users. Though still imperfect, we detected masqueraders 80.1% and 94.8% of the time, while the previous studies reported the accuracy of 69.3% and 62.8%, respectively, using the same data set containing only the command names. When command names and arguments were included in the experiment, SVM-based approach detected masqueraders 87.3% of the time while the previous study, using the same data set, reported 82.1% of accuracy. These combined experiments convincingly demonstrates that SVM is an effective approach to masquerade detection. As most sites, including those in military and intelligence domains, inevitably use Web and Web browsers to conduct their core business, ability to detect masqueraders in the Web environment is badly needed. We reports our experiments on masquerade detection based on Web sever logs collected from the KAIST Portal System, using SVM. When each Web server log entry was examined separately using per-request features such as IP and requested methods, almost all of masquerade activities were accurately detected, while false alarm rate remained very low at 3%. In spite of seemingly high performance, further analysis exhibited that IP is the only information that can be utilized and that all other pe...
Advisors
Cha, Sung-Deok차성덕
Description
한국과학기술원 : 전산학전공,
Publisher
한국과학기술원
Issue Date
2005
Identifier
244970/325007  / 020015087
Language
eng
Description

학위논문(박사) - 한국과학기술원 : 전산학전공, 2005.2, [ viii, 70 p. ]

Keywords

user command; SVM(Support Vector Machine); masquerade detection; anomaly detection; intrusion detection; Web server logs; 웹서버 로그; 사용자명령어; SVM; 신분위장기법탐지; 이상탐지; 침입탐지

URI
http://hdl.handle.net/10203/32887
Link
http://library.kaist.ac.kr/search/detail/view.do?bibCtrlNo=244970&flag=dissertation
Appears in Collection
CS-Theses_Ph.D.(박사논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0