期刊文献+

基于支持向量方法和击键序列的主机入侵检测 被引量:5

Host-based intrusion detection based on support vector approach and keystroke sequences
下载PDF
导出
摘要 击键特征是一种能反映用户行为的动态特征,可作为识别用户的信息源。传统方法不仅要求收集大量击键样本来建立识别模型,并且同时需要正例样本与反例样本。但在实际应用中,需要用户提供大量的训练样本是不现实的,并且反例样本收集比正例样本收集困难。为此,提出一种新的以击键序列为信息源的主机入侵检测模型。在小样本和仅有正例的情况下,通过One-Class支持向量机(OCSVM)来训练检测模型,通过对用户的击键行为是否偏离正常模型来检测入侵。仿真实验结果表明该模型具有较好的检测效果。 The keystroke sequences are dynamic behaviors which can be used to measure users' characteristics,so it has many advantages to indicate users in system.Previous work in this area has shown the keystroke sequences as a real possibility to authenticate a user,but it needs a large user's and imposter's data set to establish a keystroke detection model,that's impossible in practice,otherwise,it is more difficult to get imposter's patterns than normal user's.In this paper,we present an anomaly detection model based on keystroke sequences,by using OCSVM algorithm,it only needs a few owner's patterns to establish an anomaly detection model.Experimental results show that the OCSVM algorithm is promising.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第15期140-143,共4页 Computer Engineering and Applications
基金 四川省教育厅重点项目(the Key Project of Department of Education of Sichuan Province of China under Grant No.2005A117) 。
关键词 击键特征 入侵检测 身份认证 One-Class支持向量机 keystroke characteristics intrusion detection identity authentication OCSVM
  • 相关文献

参考文献9

  • 1Monrose F,Rubin A D.Keystroke dynamics as a biometric for authentication[J].Funture Generation Systems,2000,16:351-359.
  • 2Gaines R,Lisowski W,Press S.Authorization by keystroke timing:some preliminary results,R-2560-NSF[R].Rand Corporation,1980.
  • 3Leggett J,Williams G,Usnick J.Dynamic identity verification via keystroke characteristics[J].International Journal of Man-Machine Studics,1991,35:859-870.
  • 4Napier R,Laberty W,Mahar W.Keyboard user verification:toward an accurate,efficient,and ecologically valid algorithm[J].International Journal of Human-Computer Studies,1995,43:213-222.
  • 5朱明,黄云,陈锋.基于口令击键过程的用户身份识别方法研究[J].模式识别与人工智能,2003,16(2):252-256. 被引量:3
  • 6Bleha S,Slivinsky C,Hussien B.Computer access security systems using keystroke dynamics[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1990,12(12):1217-1222.
  • 7高艳,管晓宏,孙国基,冯力.基于实时击键序列的主机入侵检测[J].计算机学报,2004,27(3):396-401. 被引量:20
  • 8Brown M.User Identification via keystroke characteristics of typed names using neural networks[J].International Journal of Man-Machine Studies,1993,39(6):999-1014.
  • 9Tax D,Duin R.Data domain description using support vector[C]//Proceeding of European Symposium on Artificial Neural Networks,Brugge,1999:251-256.

二级参考文献11

  • 1[1]Bacel Rebecca, Mell2 Peter. Intrusion Detection Systems. NIST Special Publication, 2000
  • 2[2]Monrose F., Rubin A.D.. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 2000,(16): 351~359
  • 3[3]Gaines R., Lisowski W., Press S.. Authentication by keystroke timing: some preliminary results. Rand Corporation: Rand Report R-2560-NSF, 1980
  • 4[4]Leggett J., Williams G., Usnick J.. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 1991 ,(35): 859~870
  • 5[5]Napier R., Laberty W., Mahar W.. Keyboard user verification: Toward an accurate, efficient, and ecologically valid algorithm. International Journal of Human-Computer Studies, 1995,(43): 213~222
  • 6[6]Obaidat M.S., Sadoun Balqies. Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics, 1997, 27(2): 261~269
  • 7[7]Bleha D., Obaidat M.. Dimensionality reduction and feature extraction applications in identifying computer users. IEEE Transactions on Systems, Man, and Cybernetics, 1991, 21: 452~456
  • 8[8]Bleha Saleh, Slivinsky Charles, Hussien Bassam. Computer-access security systems using keystroke dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence,, 1990, 12(12): 1217~1222
  • 9Monrose F, Rubin A D. Keystroke Dynamics as a Biometric for Authentication. Future Generation Computing Systems (FGCS)Journal: Security on the Web (special issue), 2000, 341 - 345.
  • 10Monrose F, Reiter M K, Wetzel S. Password Hardening Based on Keystroke Dynamics. In: Proc of the 6th ACM Conference on Computer and Communication Security, Hawaii, USA, 1999, 26- 32.

共引文献19

同被引文献58

引证文献5

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部