Analysis of masquerade detectors performance under synthesized sessions-Edición Única

dc.contributor.advisorMex Perera, Jorge Carlos
dc.contributor.departmentITESM-Campus Monterreyen
dc.creatorPosadas López, Román
dc.date.accessioned2015-08-17T09:40:43Zen
dc.date.available2015-08-17T09:40:43Zen
dc.date.issued2006-12-01
dc.description.abstractInformatics security has nowadays become an important research topic given the impact of the computers for mankind. As computers become more important, so the interests, risks and informatics attacks. With this work we focus on a type of attack called masquerade attack, where someone impersonates other by using the other’s computer account privileges and accomplish malicious activities. We try to understand this problem and analyze the way masquerade detectors are built. The way these are built says too much about their limitations. These limitations could be used in order to build synthesized masquerade sessions that bypass such detection methods. These masquerade synthesized sessions are created by an intelligent type of masquerader that has enough knowledge of the normal behavior profile of the user to masquerade. In this thesis we analyze the relationship between the the performance of different masquerade detection methods under artificially created masquerade sessions. These sessions would be created using different properties and would affect differently to each method. The dataset provided by Schonlau, called SEA1 , has been modified for including synthetic sessions created by masqueraders that we suppose have information about the behavior profile of the users intended to impersonate. As a consequence, this work provides an approach to synthesizing sessions when these are based on commands. The synthesizing of the sessions turns out to be more effective as more features are taken into account to create the masquerade sessions. We also propose a masquerade detection method that is more tolerant against synthesized datasets when these are built based on command frequencies and script frequencies. We compare the effects on six different methods that use frequency properties or sequential properties. These effects are shown by the known ROC (Receiver Operating Characteristics) curves. After analyzing the results, we could see that our proposed method outperforms the others, being capable of detecting masquerade sessions that the other methods could not detect.
dc.identificatorCampo||7||33||3304||120325
dc.identifier.urihttp://hdl.handle.net/11285/567592en
dc.languageeng
dc.publisherInstituto Tecnológico y de Estudios Superiores de Monterrey
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0*
dc.subject.classificationArea::INGENIERÍA Y TECNOLOGÍA::CIENCIAS TECNOLÓGICAS::TECNOLOGÍA DE LOS ORDENADORES::DISEÑO DE SISTEMAS SENSORESes_MX
dc.titleAnalysis of masquerade detectors performance under synthesized sessions-Edición Únicaen
dc.typeTesis de maestría
refterms.dateFOA2018-03-17T06:58:18Z
refterms.dateFOA2018-03-17T06:58:18Z

Files

Original bundle

Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
DocsTec_4840.pdf
Size:
1.46 MB
Format:
Adobe Portable Document Format
Loading...
Thumbnail Image
Name:
DocsTec_4840_1.pdf
Size:
77.19 KB
Format:
Adobe Portable Document Format
logo

El usuario tiene la obligación de utilizar los servicios y contenidos proporcionados por la Universidad, en particular, los impresos y recursos electrónicos, de conformidad con la legislación vigente y los principios de buena fe y en general usos aceptados, sin contravenir con su realización el orden público, especialmente, en el caso en que, para el adecuado desempeño de su actividad, necesita reproducir, distribuir, comunicar y/o poner a disposición, fragmentos de obras impresas o susceptibles de estar en formato analógico o digital, ya sea en soporte papel o electrónico. Ley 23/2006, de 7 de julio, por la que se modifica el texto revisado de la Ley de Propiedad Intelectual, aprobado

DSpace software copyright © 2002-2025

Licencia