User Profiling in Anomaly Detection of Authorization Logs

被引:6
|
作者
Zamanian, Zahedeh [1 ]
Feizollah, Ali [1 ]
Anuar, Nor Badrul [1 ]
Kiah, Laiha Binti Mat [1 ]
Srikanth, Karanam [2 ]
Kumar, Sudhindra [2 ]
机构
[1] Univ Malaya, Fac Comp Sci & Informat Technol, Kuala Lumpur, Malaysia
[2] NextLabs Malaysia Sdn Bhd, 308-1st Floor,Jalan S2 B13,Seksyen B, Seremban 70300, Negeri Sembilan, Malaysia
来源
关键词
User Profiling; Anomaly Detection; Insider Intruder;
D O I
10.1007/978-981-13-2622-6_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In digital age, the valuable asset of every company is their data. They contain personal information, companies and industries data, sensitive government communications and a lot of more. With the rapid development in IT technology, accessing the network become cheaper and easier. As a result, organizations are more vulnerable to both insiders and outsider threat. This work proposes user profiling in anomaly detection and analysis of log authorization. This method enables companies to assess each user's activities and detect slight deviation from their usual pattern. To evaluate this method, we obtained a private dataset from NextLabs Company, and the CERT dataset that is a public dataset. We used random forest for this system and presented the results. The result shows that the algorithm achieved 97.81% of accuracy.
引用
收藏
页码:59 / 65
页数:7
相关论文
共 50 条
  • [1] Anomaly detection in the web logs using user-behaviour networks
    You, Jingwen
    Wang, Xiaojuan
    Jin, Lei
    Zhang, Yong
    [J]. International Journal of Web Engineering and Technology, 2019, 14 (02) : 178 - 199
  • [2] A survey on user profiling model for Anomaly Detection in Cyberspace
    Lashkari, Arash Habibi
    Chen, Min
    Ghorbani, Ali A.
    [J]. Journal of Cyber Security and Mobility, 2019, 8 (01): : 75 - 112
  • [3] On Cleaning and Organizing Context Logs for Mobile User Profiling
    Zheng, Ming-Yi
    Chen, Hung-Yuan
    Chen, Huan
    Fan, Yao-Chung
    [J]. 2017 TWELFTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM), 2017, : 161 - 164
  • [4] A Survey of Deep Anomaly Detection for System Logs
    Zhao, Xiaoqing
    Jiang, Zhongyuan
    Ma, Jianfeng
    [J]. 2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,
  • [5] Anomaly Detection on Event Logs with a Scarcity of Labels
    Barbon Junior, Sylvio
    Ceravolo, Paolo
    Damiani, Ernesto
    Omori, Nicolas Jashchenko
    Tavares, Gabriel Marques
    [J]. 2020 2ND INTERNATIONAL CONFERENCE ON PROCESS MINING (ICPM 2020), 2020, : 161 - 168
  • [6] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    [J]. 2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +
  • [7] ADOps: An Anomaly Detection Pipeline in Structured Logs
    Song, Xintong
    Zhu, Yusen
    Wu, Jianfei
    Liu, Bai
    Wei, Hongkang
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 16 (12): : 4050 - 4053
  • [8] A Comprehensive Review of Anomaly Detection in Web Logs
    Majd, Mehryar
    Najafi, Pejman
    Alhosseini, Seyed Ali
    Cheng, Feng
    Meinel, Christoph
    [J]. 2022 IEEE/ACM INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING, APPLICATIONS AND TECHNOLOGIES, BDCAT, 2022, : 158 - 165
  • [9] ANOMALY DETECTION ALGORITHMS IN BUSINESS PROCESS LOGS
    Bezerra, Fabio
    Wainer, Jacques
    [J]. ICEIS 2008: PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS, VOL AIDSS: ARTIFICIAL INTELLIGENCE AND DECISION SUPPORT SYSTEMS, 2008, : 11 - 18
  • [10] Web User Profiling on Proxy Logs and Its Evaluation in Personalization
    Fujimoto, Hiroshi
    Etoh, Minoru
    Kinno, Akira
    Akinaga, Yoshikazu
    [J]. WEB TECHNOLOGIES AND APPLICATIONS, 2011, 6612 : 107 - +