Intrusion detection through behavioral data

Daniele Gunetti, Giancarlo Ruffo

Risultato della ricerca: Capitolo in libro/report/atti di convegnoContributo a conferenzapeer review

Abstract

We present an approach to the problem of detecting intrusions in computer systems through the use behavioral data produced by users during their normal login sessions. In fact, attacks may be detected by observing abnormal behavior, and the technique we use consists in associating to each system user a classifier made with relational decision trees that will label login sessions as “legals” or as “intrusions”. We perform an experimentation for 10 users, based on their normal work, gathered during a period of three months.We obtain a correct user recognition of 90%, using an independent test set. The test set consists of new, previously unseen sessions for the users considered during training, as well as sessions from users not available during the training phase. The obtained performance is comparable with previous studies, but (1) we do not use information that may effect user privacy and (2) we do not bother the users with questions.

Lingua originaleInglese
Titolo della pubblicazione ospiteAdvances in Intelligent Data Analysis - 3rd International Symposium, IDA 1999, Proceedings
EditorDavid J. Hand, Joost N. Kok, Michael R. Berthold
EditoreSpringer Verlag
Pagine383-394
Numero di pagine12
ISBN (stampa)3540663320, 9783540663324
DOI
Stato di pubblicazionePubblicato - 1999
Pubblicato esternamente
Evento3rd International Symposium on Intelligent Data Analysis, IDA 1999 - Amsterdam, Netherlands
Durata: 9 ago 199911 ago 1999

Serie di pubblicazioni

NomeLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1642
ISSN (stampa)0302-9743
ISSN (elettronico)1611-3349

???event.eventtypes.event.conference???

???event.eventtypes.event.conference???3rd International Symposium on Intelligent Data Analysis, IDA 1999
Paese/TerritorioNetherlands
CittàAmsterdam
Periodo9/08/9911/08/99

Fingerprint

Entra nei temi di ricerca di 'Intrusion detection through behavioral data'. Insieme formano una fingerprint unica.

Cita questo