Recursive data mining for masquerade detection and author identification

被引:27
作者
Szymanski, BK [1 ]
Zhang, YQ [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Comp Sci, Troy, NY 12180 USA
来源
PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP | 2004年
关键词
masquerade detection; author identification; recursive data mining; one-class SVM; intrusion detection;
D O I
10.1109/IAW.2004.1437848
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel recursive data mining method based on the simple but powerful model of cognition called a conceptor is introduced and applied to computer security. The method recursively mines a string of symbols by finding frequent patterns, encoding them with unique symbols and rewriting the string using this new coding. We apply this technique to two related but important problems in computer security: (i) masquerade defection to prevent a security attack in which an intruder impersonates a legitimate user to gain access to the resources, and (U) author identification, in which anonymous or disputed computer session needs to be attributed to one of a set of potential authors. Many methods based on automata theory, Hidden Markov Models, Bayesian models or even matching algorithms from bioinformatics have been proposed to solve the masquerading detection problem but less work has been done on the author identification. We used recursive data mining to characterize the structure and high-level symbols in user signatures and the monitored sessions. We used one-class SVM to measure the similarity of these two characterizations. We applied weighting prediction scheme to author identification. On the SEA dataset that we used in our experiments, the results were very promising.
引用
收藏
页码:424 / 431
页数:8
相关论文
共 17 条
  • [1] [Anonymous], J MOL BIOL
  • [2] CHANG CC, 2001, LIBSVM LIB SUPP VECT
  • [3] CHEN Y, 2001, P IEEE INT C IM PROC
  • [4] Coull S., 2003, 19 ANN COMP SEC APPL
  • [5] Cristianini N., 2000, Intelligent Data Analysis: An Introduction, DOI 10.1017/CBO9780511801389
  • [6] DEMARCKEN C, 1995, 1558 MIT
  • [7] DEVEL O, 2001, MINIGN EMAIL CONTENT
  • [8] DEVEL O, 2000, MINING EMAIL AUTHORS
  • [9] HILL S, MYTH DOUBLE BLIND RE, V5, P179
  • [10] KEWLEY RH, 2000, IEEE T NEUR NETW, V11