期刊文献+

面向Unix和Linux平台的网络用户伪装入侵检测 被引量:2

Masquerade Detection towards Network Users on Unix and Linux Platforms
下载PDF
导出
摘要 基于主机的入侵检测是目前网络安全领域研究的热点内容。提出了一种基于数据挖掘和变长序列匹配的用户伪装入侵检测方法,主要用于Unix或Linux平台上以shell命令为审计数据的主机型入侵检测系统。该方法针对用户行为复杂多变的特点以及审计数据的短时相关性,利用多种长度不同的shell命令短序列来描述用户行为模式,并基于数据挖掘技术中的序列支持度在用户界面层对网络合法用户的正常行为进行建模;在检测阶段,采用了基于变长序列匹配和判决值加权的检测方案,通过单调递增相似度函数赋值和加窗平滑滤噪对被监测用户当前行为的异常程度进行精确分析,能够有效降低误报率,增强了检测性能的稳定性。实验表明,同目前典型的伪装入侵检测方法相比,该方法在检测准确度和计算成本方面均具有较大优势,特别适用于在线检测。 Host-based intrusion detection acts as one of the major directions of research in network security. This paper presents a novel method for masquerade detection based on data mining and variable-length shell command sequence matching, which is applicable to intrusion detection systems using shell commands as audit data on Unix and Linux platforms. The method employs multiple command sequences to represent user behavior pattern, and utilizes sequence supports defined in data mining technique to characterize the normal behavior profiles of legiti- mate users. In the detection stage, a model based on variable-length shell command sequence matching and decision value weighing is used to distinguish between legitimate users and masqueraders, while the particularity of audit data and user behavior is taken into account. The performance of the method is tested by computer simulation, and the results show it can achieve higher detection accuracy and efficiency than existing alternative methods.
出处 《计算机科学与探索》 CSCD 2010年第6期500-510,共11页 Journal of Frontiers of Computer Science and Technology
基金 国家高技术研究发展计划(863)No.2006AA01Z452 国家242信息安全计划No.2005C39~~
关键词 伪装攻击 入侵检测 SHELL命令 数据挖掘 异常检测 masquerade attack intrusion detection shell command data mining anomaly detection
  • 相关文献

参考文献17

  • 1TIAN Xinguang,DUAN Miyi,LI Wenfa,SUN Chunlai.Anomaly Detection of User Behavior Based on Shell Commands and Homogeneous Markov Chains[J].Chinese Journal of Electronics,2008,17(2):231-236. 被引量:12
  • 2Tian Xinguang,Duan Miyi,Sun Chunlai,Li Wenfa.Intrusion detection based on system calls and homogeneous Markov chains[J].Journal of Systems Engineering and Electronics,2008,19(3):598-605. 被引量:8
  • 3Kim H S, Cha S D. Empirical evaluation of SVM-based masquerade detection using UNIX commands[J]. Computers and Security, 2005, 24(2): 160-168.
  • 4Gao D, Retier M K, Song D. Behavioral distance measurement using hidden Markov models[C]//Proceedings of the Conference on Recent Advanced in Intrusion Detection, Hamburg, Germany, Sep, 2006: 19-40.
  • 5Mukkamala S, Sung A H, Abraham A. Intrusion detection using an ensemble of intelligent paradigms[J]. Joumal of Network and Computer Application, 2005, 28(2): 167-182.
  • 6Lane T, Carla E B. An empirical study of two approaches to sequence learning for anomaly detection[J]. Machine Learning, 2003, 51(1): 73-107.
  • 7Chaoji V, Hoonlor A, Szymanski B K. Recursive data mining for author and role identification[C]//Proceedings of the 3rd Annual Information Assurance Workshop ASIA'08, Albany, NY, June, 2008: 53-62.
  • 8Szymanski B K, Zhang Y Q. Recursive data mining for masquerade detection and author identification[C]//Proceedings of the 5th IEEE System, Man and Cybernetics Information Assurance Workshop, West Point, NY, June, 2004:424-431.
  • 9Schonlau M, Mouchel W. Computer intrusion: Detecting masquerades[J]. Statistical Science, 2001, 16(1): 58-74.
  • 10Maxion R A, Townsend T N. Masquerade detection using truncated command lines[C]//Proceedings of the International Conference on Dependable Systems and Networks, Washington, DC, USA, 2002: 219-228.

二级参考文献58

共引文献79

同被引文献9

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部