Solo Metadatos

Detection of masqueraders based on graph partitioning of file system access events

Título de la revista
Toffalini F.
Homoliak I.
Harilal A.
Binder A.
Ochoa M.



ISSN de la revista
Título del volumen
Institute of Electrical and Electronics Engineers Inc.

Buscar en:

Métricas alternativas

Masqueraders are users who take control of a machine and perform malicious activities such as data exfiltration or system misuse on behalf of legitimate users. In the literature, there are various approaches for detecting masqueraders by modeling legitimate users' behavior during their daily tasks and automatically determine whether they are doing something suspicious. Usually, these techniques model user behavior using features extracted from various sources, such as file system, network activities, system calls, etc. In this work, we propose a one-class anomaly detection approach that measures similarities between a history of a user and events recorded in a timewindow of the user's session which is to be classified. The idea behind our solution is the application of a graph partitioning technique on weighted oriented graphs generated from such event sequences, while considering that strongly connected nodes have to belong into the same cluster. First, a history of vertex clusters is build per each user and then this history is compared to a new input by using a similarity function, which leads either to the acceptance or rejection of a new input. This makes our approach substantially different from existing general graph-based approaches that consider graphs as a single entity. The approach can be applied for different kinds of homogeneous event sequences, however successful application of the approach will be demonstrated on file system access events only. The linear time complexity of the approach was demonstrated in the experiments and the performance evaluation was done using two state-of-the-art datasets - WUIL and TWOS - both of them containing file system access logs of legitimate users and masquerade attackers; for WUIL dataset we achieved an average per-user AUC of 0.94, a TPR over 95%, and a FPR less than 10%, while for TWOS dataset we achieved an average per-user AUC of 0.851, a TPR over 91% and a FPR around 11%. © 2018 IEEE.
Palabras clave
Behavioral research , File organization , Graphic methods , Network security , Real time systems , Anomaly detection , File systems , Graph Partitioning , Insider Threat , Markov cluster , Masquerader , Graph theory , Anomaly detection , File system , Graph partitioning , Insider threat , Markov cluster , Masquerader
Buscar en: