Conferencia

Estrada, V.C.; Nakao, A.; Segura, E.C. "Classifying computer session data using self-organizing maps" (2009) 2009 International Conference on Computational Intelligence and Security, CIS 2009. 1:48-53
La versión final de este artículo es de uso interno de la institución.
Consulte el artículo en la página del editor

Abstract:

We propose an advanced solution to track persistent computer intruders inside a UNIX-based system by clustering sessions into groups bearing similar characteristics according to expertise and type of work. Our semi-supervised method based on Self-Organizing Map (SOM) accomplishes classification of four types of users: computer scientists, experience programmers, non-programmers, and novice programmers. Our evaluation on a range of biometrics shows that using working directories yields better accuracy (>98.5%) than using most popular parameters like command use or keystroke patterns. © 2009 IEEE.

Registro:

Documento: Conferencia
Título:Classifying computer session data using self-organizing maps
Autor:Estrada, V.C.; Nakao, A.; Segura, E.C.
Ciudad:Beijing
Filiación:University of Tokyo, 7-3-1, Hongo, Bunkyo-ku Tokyo, 113-0033, Japan
Universidad de Buenos Aires, FCEyN Dto. de Computación, C. Universitaria, (1428), Buenos Aires, Argentina
Palabras clave:Computer scientists; Computer sessions; Keystroke patterns; Novice programmer; Semi-supervised method; Artificial intelligence; Biometrics; Conformal mapping; Self organizing maps
Año:2009
Volumen:1
Página de inicio:48
Página de fin:53
DOI: http://dx.doi.org/10.1109/CIS.2009.266
Título revista:2009 International Conference on Computational Intelligence and Security, CIS 2009
Título revista abreviado:CIS - Int. Conf. Comput. Intell. Secur.
Registro:https://bibliotecadigital.exactas.uba.ar/collection/paper/document/paper_97807695_v1_n_p48_Estrada

Referencias:

  • Intruder identification system using honeypots techniques, , http://www.citefa.gov.ar/SitioSI6-EN/si6.htm, R&D Project Paranoid
  • Kohonen, T., (2001) Self-Organizing Maps, , Springer, Third Edition
  • Kohonen, T., The Self-Organizing Map (1990) Proceedings of the IEEE, 78 (9). , September
  • Bertacchini, M., Benitez, C., NCD based masquerader detection using enriched command lines (2007) IV Iberoamerican Congress on Information Security, , CIBSI
  • Bertacchini, M., Fierens, P., Preliminary results on masquerader detection using compression based similarity metrics (2006) VIII Argentine Symposium on Artificial Intelligence (ASAI)
  • Schonlau, M., DuMouchel, W., Ju, W., Karr, A., Theus, M., Vardi, Y., Computer Intrusion: Detecting Masquerades (2001) Statistical Science, 16, pp. 58-74
  • Maxion, R.A., Masquerade Detection Using Enriched Command Lines (2003) Proceedings of International Conference on Dependable Systems and Networks (DSN '03), , San Francisco, CA
  • Hoglund, A.J., Hatonen, K., Sorvari, A.S., A computer host-based user anomaly detection system using the self-organizing map, Proceedings of the IEEE-INNS-ENNS International Joint Conference on 5, pp. 411-416, 2000; Gunes Kayacik, H., Nur Zincir-Heywood, A., Heywood, M.I., A hierarchical SOM-based intrusion detection system (2007) Eng. Appl. Artif. Intell, 20 (4), pp. 439-451. , Jun
  • Lichodzijewski, P., Network based anomaly detection using self-organizing maps (2002), Bachelor Thesis at Dalhousie University, Halifax, Nova Scotia; Joshi, S.S., Phoha, V.V., Competition between SOM Clusters to Model User Authentication System in Computer Networks (2007) Communication Systems Software and Middleware, 2nd International Conf, pp. 1-8. , 7-12 Jan
  • Lane, T., Machine Learning Techniques for the Computer Security Domain of Anomaly Detection (2000), PhD thesis, Purdue University, W. Lafayette, IN, August; Hollmén, J., (2000) User profiling and classification for fraud detection in mobile communications networks, , Helsinki University of Technology, Department of Computer Science and Engineering, Lab. of Computer and Information Science, December
  • Rogers, M., A two-dimensional circumplex approach to the development of a hacker taxonomy (2006) Digital Investigation, 3 (2), pp. 97-102. , ISSN 1742-2876, DOI: 10.1016/j.diin.2006.03.001, June
  • Voiskounsky, A., Smyslova, O., Flow in Computer Hacking: A Model (2003), pp. 176-186. , Human.Society@Internet, pages; Greenberg, S., (1988) Using Unix: Collected traces of 168 users, , Research report 1988-333-45, Department of Computer Science, University of Calgary, Calgary, Alberta, Canada, December
  • Hanson, S., Kraut, R., Farber, J., Interface Design and Multivariate Analysis of UNIX Command Use (1984) ACM Transaction on Office Information Systems, 2 (1), pp. 42-57. , March
  • Lichodzijewski, P., Zincir-Heywood, A.N., Heywood, M.I., Host-Based Intrusion Detection Using Self-Organizing Feature Maps (2002) IEEE International Joint Conference on Neural Networks, , May
  • Olson, D.L., Delen, D., (2008) Advanced Data Mining Techniques, p. 138. , p, Springer, FebruaryA4 - Beijing Institute of Technology; Guangdong University of Technology; Xidian University; IEEE Computer Society Press

Citas:

---------- APA ----------
Estrada, V.C., Nakao, A. & Segura, E.C. (2009) . Classifying computer session data using self-organizing maps. 2009 International Conference on Computational Intelligence and Security, CIS 2009, 1, 48-53.
http://dx.doi.org/10.1109/CIS.2009.266
---------- CHICAGO ----------
Estrada, V.C., Nakao, A., Segura, E.C. "Classifying computer session data using self-organizing maps" . 2009 International Conference on Computational Intelligence and Security, CIS 2009 1 (2009) : 48-53.
http://dx.doi.org/10.1109/CIS.2009.266
---------- MLA ----------
Estrada, V.C., Nakao, A., Segura, E.C. "Classifying computer session data using self-organizing maps" . 2009 International Conference on Computational Intelligence and Security, CIS 2009, vol. 1, 2009, pp. 48-53.
http://dx.doi.org/10.1109/CIS.2009.266
---------- VANCOUVER ----------
Estrada, V.C., Nakao, A., Segura, E.C. Classifying computer session data using self-organizing maps. CIS - Int. Conf. Comput. Intell. Secur. 2009;1:48-53.
http://dx.doi.org/10.1109/CIS.2009.266