首页 | 本学科首页   官方微博 | 高级检索  
     

基于shell命令和Markov链模型的用户行为异常检测
引用本文:田新广,孙春来,段洣毅.基于shell命令和Markov链模型的用户行为异常检测[J].电子与信息学报,2007,29(11):2580-2584.
作者姓名:田新广  孙春来  段洣毅
作者单位:1. 北京交通大学计算技术研究所,北京,100029;国防科技大学电子科学与工程学院,长沙,410073
2. 北京交通大学计算技术研究所,北京,100029
基金项目:国家高技术研究发展计划(863计划) , 北京首信集团资助项目
摘    要:异常检测是目前入侵检测系统(IDS)研究的主要方向.该文提出一种基于shell命令和Markov链模型的用户行为异常检测方法,该方法利用一阶齐次Markov链对网络系统中合法用户的正常行为进行建模,将Markov链的状态与用户执行的shell命令联系在一起,并引入一个附加状态;Markov链参数的计算中采用了运算量较小的命令匹配方法;在检测阶段,基于状态序列的出现概率对被监测用户当前行为的异常程度进行分析,并提供了两种可选的判决方案.文中提出的方法已在实际入侵检测系统中得到应用,并表现出良好的检测性能.

关 键 词:入侵检测  shell命令  Markov链  异常检测  行为轮廓
文章编号:1009-5896(2007)11-2580-05
收稿时间:2006-4-3
修稿时间:2006年4月3日

Anomaly Detection of User Behaviors Based on Shell Commands and Markov Chain Models
Tian Xin-guang,Sun Chun-lai,Duan mi-yi.Anomaly Detection of User Behaviors Based on Shell Commands and Markov Chain Models[J].Journal of Electronics & Information Technology,2007,29(11):2580-2584.
Authors:Tian Xin-guang  Sun Chun-lai  Duan mi-yi
Affiliation:Research Institute of Computing Technology, Beijing Jiaotong University, Beijing 100029, China;College of Electronic Science and Engineering, National Univ. of Defense Technology, Changsha 410073, China
Abstract:Anomaly detection acts as one of the important directions of research on Intrusion Detection Systems(IDSs) .This paper presents a new method for anomaly detection of user behaviors based on shell commands and Markov chain models. The method constructs a one-order Markov chain model to represent the normal behavior profile of a network user,and associates shell commands with the states of the Markov chain. The parameters of the Markov chain model are estimated by a command matching algorithm which is computationally efficient. At the detection stage,the probabilities of the state sequences of the Markov chain is firstly computed,and two different schemes can be used to determine whether the monitored user's behaviors are normal or anomalous while the particularity of user behaviors is taken into account. The application of the method in practical intrusion detection systems shows that it can achieve high detection performance.
Keywords:Intrusion detection  Shell command  Markov chain  Anomaly detection  Behavior profile
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号