S. Heatley, James R. Otto
{"title":"Data mining computer audit logs to detect computer misuse","authors":"S. Heatley, James R. Otto","doi":"10.1002/(SICI)1099-1174(199809)7:3%3C125::AID-ISAF146%3E3.0.CO;2-L","DOIUrl":null,"url":null,"abstract":"All computers are vulnerable to misuse either by unauthorized users penetrating the system or by authorized users abusing their privileges. This paper describes the use of a data mining process to sift through large (gigabytes) computer audit log databases to detect potential improper accesses of sensitive data files by authorized users. Computer audit logs record information about what files were accessed by which users and when. The detection of computer misuse is important because computer misuse can be related to acts of computer fraud, information theft, software piracy, and violations of privacy, to name a few. The data mining process described in this paper can be applied to detect possible fraud in a wide variety of situations that share some common characteristics: first, a class of ‘sensitive’ files can be identified which may be subject to improper access; second, the selection of files by users is a random process; and third, the probability that a user-selected file is from the sensitive class should be the same for all members of a group of users. Examples of possible applications of the data mining process include detecting inappropriate accesses to classified files, celebrity files, financial accounts with high balances, and files known to have been improperly used. © 1998 John Wiley & Sons, Ltd.","PeriodicalId":153549,"journal":{"name":"Intell. Syst. Account. Finance Manag.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intell. Syst. Account. Finance Manag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/(SICI)1099-1174(199809)7:3%3C125::AID-ISAF146%3E3.0.CO;2-L","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
数据挖掘计算机审计日志,检测计算机误用
所有计算机都容易受到未经授权的用户侵入系统或授权用户滥用其特权的滥用。本文描述了使用数据挖掘过程来筛选大型(千兆字节)计算机审计日志数据库,以检测授权用户对敏感数据文件的潜在不当访问。计算机审计日志记录了哪些用户在何时访问了哪些文件。检测计算机滥用是很重要的,因为计算机滥用可能与计算机欺诈、信息盗窃、软件盗版和侵犯隐私等行为有关。本文中描述的数据挖掘过程可以应用于在具有一些共同特征的各种情况下检测可能的欺诈行为:首先,可以识别一类可能受到不正当访问的“敏感”文件;其次,用户对文件的选择是一个随机的过程;第三,用户选择的文件来自敏感类的概率对于一组用户的所有成员应该是相同的。数据挖掘过程的可能应用示例包括检测对机密文件、名人文件、高余额财务帐户和已知已被不当使用的文件的不适当访问。©1998 John Wiley & Sons, Ltd
本文章由计算机程序翻译,如有差异,请以英文原文为准。