Anomaly instruction detection of masqueraders and threat evaluation using fuzzy logic

被引:2
|
作者
Yingbing Yu [1 ]
Graham, James H. [2 ]
机构
[1] Dept Comp Sci, Bowling Green, KY 42101 USA
[2] Univ Louisville, Dept Comp Engn, Louisville, KY 40292 USA
关键词
D O I
10.1109/ICSMC.2006.385207
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One critical threat facing many organizations is the inside attacks from masqueraders, internal users or external intruders who exploit legitimate user identity and perform malicious attacks. Anomaly intrusion detection systems can be deployed to build a user behavior profile from his/her past activities in a computer system and detect masqueraders if a large deviation is observed. In this paper, we use a finite automata based model to construct a normal behavior reference model from the analysis of shell command sequences. A fuzzy evaluation mechanism is proposed to classify the degree of threat as linguistic terms. The fuzzy number calculated from the output of a fuzzy inference system is compared with predefined generalized fuzzy numbers representing different threat levels. A case wit! be labeled as the linguistic term which has the highest similarity value with it. Experiments conducted on two data sets both achieved high detection rates of masqueraders and few false alarms, which stand out other methods.
引用
收藏
页码:2309 / +
页数:2
相关论文
共 50 条
  • [1] Anomaly Detection in Data Streams using Fuzzy Logic
    Khan, Muhammad Umair
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, 2009, : 126 - 133
  • [2] Network Anomaly Detection System using Genetic Algorithm and Fuzzy Logic
    Hamamoto, Anderson Hiroshi
    Carvalho, Luiz Fernando
    Hiera Sampaio, Lucas Dias
    Abrao, Taufik
    Proenca, Mario Lemes, Jr.
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 92 : 390 - 402
  • [3] Anomaly Detection in VoIP System Using Neural Network and Fuzzy Logic
    Shekokar, Narendra
    Devane, Satish
    [J]. COMPUTATIONAL INTELLIGENCE AND INFORMATION TECHNOLOGY, 2011, 250 : 537 - +
  • [4] Fuzzy Logic Inference for Unsupervised Anomaly Detection
    Gladkykh, Tetiana
    Hnot, Taras
    Solskyy, Volodymyr
    [J]. PROCEEDINGS OF THE 2016 IEEE FIRST INTERNATIONAL CONFERENCE ON DATA STREAM MINING & PROCESSING (DSMP), 2016, : 42 - 47
  • [5] Computer systems threat evaluation: An agent-based and fuzzy logic intrusion detection architecture
    Hamed, E
    Graham, J
    Elmaghraby, A
    [J]. INTELLIGENT SYSTEMS, 2001, : 23 - 26
  • [6] An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 713 - 718
  • [7] Malware Threat Assessment Using Fuzzy Logic Paradigm
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjeev
    [J]. CYBERNETICS AND SYSTEMS, 2017, 48 (01) : 29 - 48
  • [8] EWMA STATISTICS AND FUZZY LOGIC IN FUNCTION OF NETWORK ANOMALY DETECTION
    Cisar, Petar
    Cisar, Sanja Maravic
    [J]. FACTA UNIVERSITATIS-SERIES ELECTRONICS AND ENERGETICS, 2019, 32 (02) : 249 - 265
  • [9] Emerging explosive threat analysis for using threat anomaly detection (ThreAD)
    Languirand, Eric R.
    Polk, Amee L.
    Kauzlarich, Michael F.
    Buchman, Jacob A.
    Collins, Matthew D.
    [J]. CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR, AND EXPLOSIVES, CBRNE SENSING XXV, 2024, 13056
  • [10] Detection and Evaluation of Driver Distraction Using Machine Learning and Fuzzy Logic
    Aksjonov, Andrei
    Nedoma, Pavel
    Vodovozov, Valery
    Petlenkov, Eduard
    Herrmann, Martin
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2019, 20 (06) : 2048 - 2059