186 research outputs found

    Optimized Naive-Bayes Detection System

    Get PDF
    A Masquerader is a malicious user who tries to gain access or control of a system from a proper user. The objective of this thesis is to increase the accuracy of the existing Nave-Bayes Algorithm for detecting Masquerade attempts. We have an Online and an Offline classifier. The Classifier used in our experiments is the Nave-Bayes Classifier. Although the dataset is being learned by the Online and the Offline classifier simultaneously, the online classifier makes an instantaneous decision whereas the Offline makes it after a specified span of time. We try to increase the accuracy of the detection system by increasing the number of parameters within the dataset and also by the introduction of a Toggling factor between the Online and the Offline classifiers. The Nave-Bayes classifier builds a proper user model and an improper model from the training dataset. The Test sessions are classified against these models. The E-M Algorithm was used to generate a probabilistic score for the unidentified sessions in the testing phase. The dataset was prepared from the log files of different users that logged into the Computer Science Administrative Server (a.cs.okstate.edu) for Oklahoma State University. Experimental results demonstrate that the Online & Offline classifier with commands and the extra parameter namely the CPU time outperformed the Online & Offline classifier with commands in terms of both the false alarm rate and the hit rate.Computer Science Departmen

    Probabilistic Vs Clustering Analysis of Modified Unix Command Lines for Masquerade Detection

    Get PDF
    A computer system masquerader is an intruder who takes over a genuine user session and misuses it. These Masqueraders also called insiders are those who work within the organization and try to either attain more system privileges in the form of impersonation, or misuse their privileges which then become an abuse. Detecting and alarming such intrusions is the primary goal of masquerade detection techniques. A survey of previously undertaken research shows that a behavior analysis can be carried out to detect masqueraders. Automatic discovery of masqueraders is possible by discovering significant departures of test command sessions from the normal user profiles based on command histories. In this line of experiments Schonlau et al performed testing based on a data set comprised of truncated command lines. These experiments proved less efficient with the best detection result reported for a Bayes one-step Markov model, which achieved a hit rate of 69.3% with a corresponding false-alarm rate of 6.7%. Roy A. Maxion and Tahlia N. Townsend reported a 61.5% hit rate and a false-alarm rate of 1.3% based on a na?ve Bayes classification technique. This thesis outlines some of these techniques and their difficulties. As an extension to these techniques we propose a Bayesian network technique that uses a Hybrid classifier of Na?ve Bayes and Deferred Na?ve Bayes classifiers. This approach combines the advantages of both online (Na?ve Bayes) and offline (Deferred Na?ve Bayes) classifiers. With the Bayesian Networks Classifier we also present a clustering approach adopted from the data mining literature for masquerade detection. Finally, a comparative study of the two proposed classifiers and Na?ve Bayes Classifier was carried out with the help of ROC Curves showing the respective hit rates to false alarm rates.Computer Science Departmen

    Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach

    Get PDF
    The broad utilization of virtualization in representing security basis conveys unrivaled security worries for inhabitants or clients and presents an extra layer that itself must be totally arranged and secured. Gatecrashers can abuse the extensive measure of assets for their attacks. This venture talks about two methodologies .In the initial three elements to be specific continuous attacks, autonomic counteractive action activities and hazard measure are incorporated to our Autonomic Intrusion Detection Framework (AIDF) as the majority of the present security advancements don't give the fundamental security components to frameworks, for example, early notices about future progressing attacks, autonomic avoidance activities and hazard measure. Accordingly, the controller can take proactive restorative activities before the attacks represent a genuine security hazard to the framework. In another Attack Sequence Detection (ASD) approach as assignments from various clients might be performed on a similar machine. In this way, one essential security concern is whether client information is secure in. Then again, programmer may encourage processing to dispatch bigger scope of attack. For example, a demand of port output in with numerous virtual machines executing such vindictive activity. In, for instance, avoiding a simple to adventure machine and afterward utilizing the past traded off to attack the objective. Such attack plan might be stealthy or inside the registering condition. So intrusion detection framework or firewall experiences issues to recognize it
    • …
    corecore