masquerade detection
Recently Published Documents


TOTAL DOCUMENTS

77
(FIVE YEARS 6)

H-INDEX

12
(FIVE YEARS 1)

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 2084 ◽  
Author(s):  
Jorge Maestre Vidal ◽  
Marco Antonio Sotelo Monge

In recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intentionally conducted by persons outside the organization that somehow were able to impersonate legitimate users. Consequently, it is assumed that masqueraders are unaware of the protected environment within the targeted organization, so it is expected that they move in a more erratic manner than legitimate users along the compromised systems. This feature makes them susceptible to being discovered by dynamic user verification methods based on user profiling and anomaly-based intrusion detection. However, these approaches are susceptible to evasion through the imitation of the normal legitimate usage of the protected system (mimicry), which is being widely exploited by intruders. In order to contribute to their understanding, as well as anticipating their evolution, the conducted research focuses on the study of mimicry from the standpoint of an uncharted terrain: the masquerade detection based on analyzing locality traits. With this purpose, the problem is widely stated, and a pair of novel obfuscation methods are introduced: locality-based mimicry by action pruning and locality-based mimicry by noise generation. Their modus operandi, effectiveness, and impact are evaluated by a collection of well-known classifiers typically implemented for masquerade detection. The simplicity and effectiveness demonstrated suggest that they entail attack vectors that should be taken into consideration for the proper hardening of real organizations.


2020 ◽  
Vol 156 ◽  
pp. 168-173
Author(s):  
Jia Liu ◽  
Miyi Duan ◽  
Wenfa Li ◽  
Xinguang Tian

Author(s):  
Bin Zhang ◽  
Xi Xiao ◽  
Weizhe Zhang ◽  
Arun Kumar Sangaiah ◽  
Ying Zhou ◽  
...  

Author(s):  
Pranieth Chandrasekara ◽  
Hasini Abeywardana ◽  
Sammani Rajapaksha ◽  
Sanjeevan Parameshwaran ◽  
Kavinga Yapa Abeywardana

2018 ◽  
Vol 2018 ◽  
pp. 1-24 ◽  
Author(s):  
Wisam Elmasry ◽  
Akhan Akbulut ◽  
Abdul Halim Zaim

In computer security, masquerade detection is a special type of intrusion detection problem. Effective and early intrusion detection is a crucial factor for computer security. Although considerable work has been focused on masquerade detection for more than a decade, achieving a high level of accuracy and a comparatively low false alarm rate is still a big challenge. In this paper, we present a comprehensive empirical study in the area of anomaly-based masquerade detection using three deep learning models, namely, Deep Neural Networks (DNN), Long Short-Term Memory Recurrent Neural Networks (LSTM-RNN), and Convolutional Neural Networks (CNN). In order to surpass previous studies on this subject, we used three UNIX command line-based datasets, with six variant data configurations implemented from them. Furthermore, static and dynamic masquerade detection approaches were utilized in this study. In a static approach, DNN and LSTM-RNN models are used along with a Particle Swarm Optimization-based algorithm for their hyperparameters selection. On the other hand, a CNN model is employed in a dynamic approach. Moreover, twelve well-known evaluation metrics are used to assess model performance in each of the data configurations. Finally, intensive quantitative and ROC curves analyses of results are provided at the end of this paper. The results not only show that deep learning models outperform all traditional machine learning methods in the literature but also prove their ability to enhance masquerade detection on the used datasets significantly.


2018 ◽  
Vol 30 (5) ◽  
pp. 959-974 ◽  
Author(s):  
José Benito Camiña ◽  
Miguel Angel Medina-Pérez ◽  
Raúl Monroy ◽  
Octavio Loyola-González ◽  
Luis Angel Pereyra Villanueva ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document