Intruders and masqueraders are a plague in computer networks. To recognize an intruder, one firstly needs to know what is the normal behavior of a legitimate user. To find it out, we propose to build pairs of profiles called 'command and block profiles'. Schonlau data (SEA) are used for illustration of the concept and its usability in work with real data. The elaborated data contain observations for 50 users; for each of them a sequence of 15,000 system calls was recorded. Data for 21 users are pure; data for the remaining 29 users are contaminated with activities of alien (illegitimate) users. We consider only the uncontaminated data (for the 21 users). 5 out of 21 investigated users seem to change their profiles during work time. Some trials have shown that the proposed simple method may also recognize a big part of alien implanted blocks. © 2011 Springer-Verlag.
CITATION STYLE
Bartkowiak, A. M. (2011). Command and block profiles for legitimate users of a computer network. In Communications in Computer and Information Science (Vol. 245 CCIS, pp. 295–304). https://doi.org/10.1007/978-3-642-27245-5_35
Mendeley helps you to discover research relevant for your work.