An instant messaging intrusion detection system framework: Using character frequency analysis for authorship identification and validation

被引:6
|
作者
Orebaugh, Angela
机构
关键词
D O I
10.1109/CCST.2006.313445
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The medium of instant messaging (IM) is a well-established means of fast and effective communication. However, a framework for analysis of instant messaging has gone largely unexplored until now. This paper explores instant messaging authorship identification and validation in terms of an author profiling framework and an anomaly-based intrusion detection system (IDS). The framework includes author behavior categories, which are the set of characteristics that remain relatively constant for a large number of messages written by the author. Specific topics include user pattern analysis, user profiling, categorization, computational linguistics, data mining, and anomaly detection. The experiments focus on applying character frequency analysis to IM messages for authorship identification and validation. This addresses the questions; can we identify an author of an IM conversation based strictly on user behavior, do different conversations with a single user look similar, do conversations with different users look different, and what is the demarcation between similar and different? Another experiment focuses on applying an instance-based learning algorithm to the character frequency of IM user messages for authorship identification and validation. The experiment applies the nearest-neighbor classification method to classify messages. It also calculates a degree of confidence to validate the identity of the IM user.
引用
收藏
页码:160 / 172
页数:13
相关论文
共 50 条
  • [21] Implementation of application layer Intrusion Detection System using protocol analysis
    Sangeetha, S.
    Vaidehi, V.
    Srinivasan, N.
    Rajkumar, K. V.
    Pradeep, S.
    Ragavan, N.
    Lokesh, C. Sri Sai
    Subadeepak, I.
    Prashanth, V.
    [J]. ICSCN 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING COMMUNICATIONS AND NETWORKING, 2008, : 279 - 284
  • [22] Performance Analysis of Network Intrusion Detection System using Machine Learning
    Alsaeedi, Abdullah
    Khan, Mohammad Zubair
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (12) : 671 - 678
  • [23] A deep learning technique for intrusion detection system using a Recurrent Neural Networks based framework
    Kasongo, Sydney Mambwe
    [J]. COMPUTER COMMUNICATIONS, 2023, 199 : 113 - 125
  • [24] Machine learning based framework for network intrusion detection system using stacking ensemble technique
    Parashar, Anshu
    Saggu, Kuljot Singh
    Garg, Anupam
    [J]. INDIAN JOURNAL OF ENGINEERING AND MATERIALS SCIENCES, 2022, 29 (04) : 509 - 518
  • [25] Application Of MEMS As The Hardware Sensor On Network Access Intrusion Detection System Using Alba Framework
    Navarro, Eric
    Paglinawan, Arnold C.
    [J]. 2014 INTERNATIONAL CONFERENCE ON HUMANOID, NANOTECHNOLOGY, INFORMATION TECHNOLOGY, COMMUNICATION AND CONTROL, ENVIRONMENT AND MANAGEMENT (HNICEM), 2014,
  • [26] Novel Framework for an Intrusion Detection System Using Multiple Feature Selection Methods Based on Deep Learning
    Eljialy, A. E. M.
    Uddin, Mohammed Yousuf
    Ahmad, Sultan
    [J]. TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (04) : 948 - 958
  • [27] Principle Component Analysis based Intrusion Detection System Using Support Vector Machine
    Praneeth, N. S. K. H.
    Varma, Naveen M.
    Naik, Roshan Ramakrishna
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2016, : 1344 - 1350
  • [28] Performance Analysis of Intrusion Detection System in the IoT Environment Using Feature Selection Technique
    Alhanaya, Moody
    Al-Shqeerat, Khalil Hamdi Ateyeh
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 36 (03): : 3709 - 3724
  • [29] An intelligent intrusion detection and response system using hybrid ward hierarchical clustering analysis
    Hooper, Emmanuel
    [J]. MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 1187 - 1192
  • [30] Comparative Analysis of Intrusion Detection System Using Machine Learning and Deep Learning Algorithms
    Note, Johan
    Ali, Maaruf
    [J]. Annals of Emerging Technologies in Computing, 2022, 6 (03) : 19 - 36