Skip to main content

Towards an Immunity-Based System for Detecting Masqueraders

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 2774))

Abstract

An immunity-based approach that utilizes multiple profiles for detecting masqueraders in UNIX-like systems has been developed and evaluated. The approach was independent of the profile construction method. Experimental results can be summarized as follows: 1) the present approach outperformed a number of previous approaches; 2) performance was almost independent of the number of accounts when the number of accounts exceeded 10; 3) the addition of profiles enhanced performance.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. National plan for information systems protection, Washington, D. C. (2000)

    Google Scholar 

  2. Davison, B., Hirsh, H.: Predicting sequences of user action. In: Proc. of AAAI 1998/ICML 1998 Workshop. Technical Report WS-98-07, AAAI Press, pp. 5–12 (1998)

    Google Scholar 

  3. Lane, T.: Hidden markov models for human/computer interface modeling. In: Proc. of IJCAI 1999 Workshop on Learning about Users, pp. 35–44 (1999)

    Google Scholar 

  4. Okamoto, T., Ishida, Y.: Test statistics for a masquerader detection system – a comparison between hidden markov model and other probabilistic models. Transactions of the ISCIE 16, 61–69 (2003)

    Google Scholar 

  5. Schonlau, M., Theus, M.: Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters 76, 33–38 (2000)

    Article  Google Scholar 

  6. Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science 16, 58–74 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  7. Egan, J.: Signal Detection Theory and ROC Analysis. Academic Press, London (1975)

    Google Scholar 

  8. Schonlau, M.: Masquerading user data (Matthias Schonlau’s (Matt Schonlau) home page), http://www.schonlau.net

  9. Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for unix processes. In: IEEE Symposium on Security and Privacy, pp. 120–128 (1996)

    Google Scholar 

  10. Ishida, Y., Adachi, N.: An immune algorithm for multiagent: Application to adaptive noise neutralization. In: Proc. of IROS 1996, pp. 1739–1746 (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Okamoto, T., Watanabe, T., Ishida, Y. (2003). Towards an Immunity-Based System for Detecting Masqueraders. In: Palade, V., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2003. Lecture Notes in Computer Science(), vol 2774. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-45226-3_67

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-45226-3_67

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40804-8

  • Online ISBN: 978-3-540-45226-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics