Empirical evaluation of SVM-based masquerade detection using UNIX commands

Cited 38 time in webofscience Cited 0 time in scopus
  • Hit : 464
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKim, Han-Sungko
dc.contributor.authorCha, Sungdeokko
dc.date.accessioned2013-03-06T15:15:08Z-
dc.date.available2013-03-06T15:15:08Z-
dc.date.created2012-02-06-
dc.date.created2012-02-06-
dc.date.issued2005-03-
dc.identifier.citationCOMPUTERS & SECURITY, v.24, pp.160 - 168-
dc.identifier.issn0167-4048-
dc.identifier.urihttp://hdl.handle.net/10203/87381-
dc.description.abstractMasqueraders who impersonate other users pose serious threat to computer security. Unfortunately, firewalls or misuse-based intrusion detection systems are generally ineffective in detecting masquerades. Although anomaly detection techniques have tong been considered as an effective approach to complement misuse detection techniques, they are not widely used in practice due to poor accuracy and relatively high degree of false alarms. In this paper, we performed an empirical study investigating the effectiveness of SVM (support vector machine) in detecting masquerade activities using two different UNIX command sets used in previous studies [R. Maxion, N. Townsend, Proceedings of international conference on dependable systems and networks (DSN-02), p. 219-28, June 2002; R. Maxion, Proceedings of international conference on dependable systems and networks (DSN-03), p. 5-14, June 2003]. Concept of common commands was introduced as a feature to more effectively reflect diverse command patterns exhibited by various users. Though still imperfect, we detected masquerades 80.1% and 94.8% of the time, white the previous studies reported the accuracy of 69.3% and 62.8%, respectively, using the same data set containing only the command names. When command names and arguments were included in the experiment, SVM-based approach detected masquerades 87.3% of the time white the previous study, using the same data set, reported 82.1% of accuracy. These combined experiments convincingly demonstrate that SVM is an effective approach to masquerade detection.-
dc.languageEnglish-
dc.publisherELSEVIER ADVANCED TECHNOLOGY-
dc.subjectCOMPUTER INTRUSION-
dc.titleEmpirical evaluation of SVM-based masquerade detection using UNIX commands-
dc.typeArticle-
dc.identifier.wosid000228118100025-
dc.identifier.scopusid2-s2.0-17844372755-
dc.type.rimsART-
dc.citation.volume24-
dc.citation.beginningpage160-
dc.citation.endingpage168-
dc.citation.publicationnameCOMPUTERS & SECURITY-
dc.identifier.doi10.1016/j.cose.2004.08.007-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorintrusion detection-
dc.subject.keywordAuthormasquerade detection-
dc.subject.keywordAuthoranomaly detection-
dc.subject.keywordAuthormachine learning-
dc.subject.keywordAuthorsupport vector machine (SVM)-
dc.subject.keywordPlusCOMPUTER INTRUSION-
Appears in Collection
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 38 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0