首页 | 本学科首页   官方微博 | 高级检索  
     


Modelling and solving the intrusion detection problem in computer networks
Authors:Rachid  
Affiliation:Faculty of Sciences, 12 Boulevard Bouaouina, Béjaïa 06000, Algeria
Abstract:We introduce a novel anomaly intrusion detection method based on a Within-Class Dissimilarity, WCD. This approach functions by using an appropriate metric WCD to measure the distance between an unknown user and a known user defined respectively by their profile vectors. First of all, each user performs a set of commands (events) on a given system (Unix for example). The events vector of a given user profile is a binary vector, such that an element of this vector is equal to “1” if an event happens, and to “0” otherwise. In addition to this, each user's class k has a typical profile defined by the vector Pk, in order to test if a new user i defined by its profile vector Pi belongs to the same class k or not. The Pk vector is a weighted events vector Ek, such that each weight represents the number of occurrences of an event ek. If the “distance” dki (measured by a dissimilarity parameter) between an unknown profile Pi and a known profile Pk is reasonable according to a given threshold and to some constraints, then there is no intrusion. Else, the user i is suspicious. A simple example illustrates the WCD procedure. A survey of intrusion detection methods is presented.Our proposed method based on clustering users and using simple statistical formulas is very easy for implementation.
Keywords:Intrusion detection  Audit trail analysis  Within-Class Dissimilarity  User behavior  Anomaly intrusion detection  Misuse intrusion detection
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号