首页 | 本学科首页   官方微博 | 高级检索  
     

基于模式挖掘的用户行为异常检测
引用本文:连一峰,戴英侠,王航.基于模式挖掘的用户行为异常检测[J].计算机学报,2002,25(3):325-330.
作者姓名:连一峰  戴英侠  王航
作者单位:中国科学院研究生院信息安全国家重点实验室,北京,100039
基金项目:国家“九七三”重点基础研究发展规划项目 (G19990 3 5 80 1),国家信息化工作领导小组计算机网络系统安全技术研究项目(2 0 0 1研 1-0 8)资助
摘    要:行为模式通常反映了用户的身份和习惯,该文阐述了针对Telnet会话中用户执行的shell命令,利用数据挖掘中的关联分析和序列挖掘技术对用户行为进行模式挖掘的方法,分析了传统的相关函数法在应用于序列模式比较时的不足,提出了基于递归式相关函数的模式比较算法,根据用户历史行为模式和当前行模式的比较相似度来检测用户行为中的异常,最后给出了相应的实验结果。

关 键 词:行为模式  数据挖掘  相似度  递归式相关函数  用户行为异常检测  入侵检测系统  网络安全  计算机网络
修稿时间:2001年6月4日

Anomaly Detection of User Behaviors Based on Profile Mining
LIAN Yi,Feng,DAI Ying,Xia,WANG Hang.Anomaly Detection of User Behaviors Based on Profile Mining[J].Chinese Journal of Computers,2002,25(3):325-330.
Authors:LIAN Yi  Feng  DAI Ying  Xia  WANG Hang
Abstract:Anomaly detection acts as the major direction of research in intrusion detection. Detecting anomalies in system/user behavior profiles can help us to discover unknown attacks. The critical problem of Anomaly Detection lies in how to construct the normal usage profiles and how to perform profile comparison. Fortunately, researchers of Columbia University pointed out a feasible solution for us: data mining. They also presented some inspiring results of experiments. As a kind of application specific approach for data processing, data mining has the ability to discover hidden knowledge from large volumes of security audit data. Data mining techniques, including association analysis, sequence mining and data classification, can greatly improve the ability of mining user behavior profiles which usually reflect identities and habits of users. We use Bro, a stand alone system for detecting network intruders in real time, to extract siell commands presented by users during telnet sessions. Commands are formatted and organized into audit records. After that, the apriori algorithm and the sliding window division algorithm are introduced to mine behavior profiles which are composed of association rules and sequence patterns from these audit records. After demonstrating the defect of traditional comparison algorithm which makes use of correlation functions to compare similarities between history profiles and present ones, we present our algorithm named recursive correlations to complete the comparison task and calculate similarities for detecting anomalous behaviors. In order to verify the validity of our approach, we simulate some kinds of anomalous behaviors based on telnet sessions and compare the mined profiles with those from normal behaviors. Results of experiments show distinct differences between them. With the help of such kinds of data mining techniques and profile comparison algorithms, we are provided with the capability of detecting anomalies which often indicate malicious attacks.
Keywords:behavior profiles  data mining  similarity  recursive correlation function  
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号