Masquerader classification system with Linux command sequences using machine learning algorithms

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intrusion Detection System plays a major role in today's security infrastructure. Both insider and outsider threats could be addressed by intrusion detection systems where the other components fail to do so. Firewalls can address only outsider threats where the log files manipulation can address only insider threats. The objective of this research paper is to apply the classifiers for UNIX User data and find the best algorithm. From the available UNIX User data all 9100 instances are taken. The classification rate and the false positive rate are used as the performance criteria with 3 fold cross validation. It is found that ZeroR is giving high performance with low false alarm rate and high classification rate. Real time data in truncated and enriched formats are also applied to finalize the best algorithm under each category of classifier. Here 6824 instances are used. BayesNet and REPTree are found to be the best performing algorithms. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Subbulakshmi, T., Mercy Shalinie, S., & Ramamoorthi, A. (2012). Masquerader classification system with Linux command sequences using machine learning algorithms. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6411 LNCS, pp. 296–302). https://doi.org/10.1007/978-3-642-27872-3_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free