Command and block profiles for legitimate users of a computer network

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Intruders and masqueraders are a plague in computer networks. To recognize an intruder, one firstly needs to know what is the normal behavior of a legitimate user. To find it out, we propose to build pairs of profiles called 'command and block profiles'. Schonlau data (SEA) are used for illustration of the concept and its usability in work with real data. The elaborated data contain observations for 50 users; for each of them a sequence of 15,000 system calls was recorded. Data for 21 users are pure; data for the remaining 29 users are contaminated with activities of alien (illegitimate) users. We consider only the uncontaminated data (for the 21 users). 5 out of 21 investigated users seem to change their profiles during work time. Some trials have shown that the proposed simple method may also recognize a big part of alien implanted blocks. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Bartkowiak, A. M. (2011). Command and block profiles for legitimate users of a computer network. In Communications in Computer and Information Science (Vol. 245 CCIS, pp. 295–304). https://doi.org/10.1007/978-3-642-27245-5_35

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free