dc.creatorToffalini F.
dc.creatorHomoliak I.
dc.creatorHarilal A.
dc.creatorBinder A.
dc.creatorOchoa M.
dc.date.accessioned2020-05-25T23:58:25Z
dc.date.accessioned2022-09-22T13:53:36Z
dc.date.available2020-05-25T23:58:25Z
dc.date.available2022-09-22T13:53:36Z
dc.date.created2020-05-25T23:58:25Z
dc.identifierhttps://repository.urosario.edu.co/handle/10336/22859
dc.identifierhttps://doi.org/10.1109/SPW.2018.00037
dc.identifier.urihttp://repositorioslatinoamericanos.uchile.cl/handle/2250/3433743
dc.description.abstractMasqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting masqueraders by modeling legitimate users' behavior during their daily tasks and automatically determine whether they are doing something suspicious. Usually, these techniques model user behavior using features extracted from various sources, such as file system, network activities, system calls, etc. In this work, we propose a one-class anomaly detection approach that measures similarities between a history of a user and events recorded in a timewindow of the user's session which is to be classified. The idea behind our solution is the application of a graph partitioning technique on weighted oriented graphs generated from such event sequences, while considering that strongly connected nodes have to belong into the same cluster. First, a history of vertex clusters is build per each user and then this history is compared to a new input by using a similarity function, which leads either to the acceptance or rejection of a new input. This makes our approach substantially different from existing general graph-based approaches that consider graphs as a single entity. The approach can be applied for different kinds of homogeneous event sequences, however successful application of the approach will be demonstrated on file system access events only. The linear time complexity of the approach was demonstrated in the experiments and the performance evaluation was done using two state-of-the-art datasets - WUIL and TWOS - both of them containing file system access logs of legitimate users and masquerade attackers; for WUIL dataset we achieved an average per-user AUC of 0.94, a TPR over 95%, and a FPR less than 10%, while for TWOS dataset we achieved an average per-user AUC of 0.851, a TPR over 91% and a FPR around 11%. © 2018 IEEE.
dc.languageeng
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.relationProceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018,(2018); pp. 217-227
dc.relationhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85052233085&doi=10.1109%2fSPW.2018.00037&partnerID=40&md5=a5b6378c25675322271d6a8f28a23428
dc.relation227
dc.relation217
dc.relationProceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rightsAbierto (Texto Completo)
dc.sourceinstname:Universidad del Rosario
dc.sourcereponame:Repositorio Institucional EdocUR
dc.titleDetection of masqueraders based on graph partitioning of file system access events
dc.typeconferenceObject


Este ítem pertenece a la siguiente institución