کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
461756 696628 2012 12 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Masquerade attacks based on user's profile
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Masquerade attacks based on user's profile
چکیده انگلیسی

This paper presents a set of methods for building masquerade attacks. Each method takes into account the profile of the user to be impersonated, thus capturing an intruder strategy. Knowledge about user behavior is extracted from several statistics, including the frequency at which a user types a specific group of commands. It is then expressed by rules, which are applied to synthesize computer sessions that mimic the attack as ordinary user behavior. The masquerade attack datasets have been validated by making a set of Intrusion Detection Systems (IDS) try to detect user impersonation, this way showing the capabilities of each masquerade synthesis method for evading detection. Results demonstrate that a better performance of masquerade attacks can be obtained by using methods based on behavioral rules rather than those based only on a single statistic. Summing up, masquerade attacks exhibit a good strategy for bypassing an IDS.


► We provide methods to build masquerade test set using a profile of target victims.
► One can compare rival masquerade detection methods or verify their vulnerabilities.
► Masquerade attacks are synthesized, making attacks similar to real victim behavior.
► Modern masquerade detection systems are limited in detecting well-informed attackers.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Journal of Systems and Software - Volume 85, Issue 11, November 2012, Pages 2640–2651
نویسندگان
, , ,