{"title":"Honeypot-Assisted Masquerade Detection with Character-Level Machine Learning","authors":"Ryusei Higuchi, H. Ochiai, H. Esaki","doi":"10.1109/KST57286.2023.10086831","DOIUrl":null,"url":null,"abstract":"Intrusions into the shell of Linux operating systems through ssh, telnet, etc. are critical. It is important to detect the access of newly-emerging attackers, distinguishing them from the legitimate users. We propose the use of honeypots for collecting the trend of malicious commands, and to train character-level machine learning models for masquerade detection. In this paper, we provide a profiling of 1,314,834 commands collected in 173 days with our honeypot in 2021. We also provide our evaluation with Logistic Regression and several configurations of 1D-CNN and 2D-CNN, using the honeypot commands and legitimate commands collected from 32 users on 27 servers. The evaluation results indicate that 1D-CNN(shallow) and 2D-CNN(large) models provide a good performance regarding detection rate and false positive rate. Even when the trends of honeypot commands changed, the detection rate were almost 100% and the false positive rate were 0.0% regarding the two models.","PeriodicalId":351833,"journal":{"name":"2023 15th International Conference on Knowledge and Smart Technology (KST)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 15th International Conference on Knowledge and Smart Technology (KST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/KST57286.2023.10086831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Intrusions into the shell of Linux operating systems through ssh, telnet, etc. are critical. It is important to detect the access of newly-emerging attackers, distinguishing them from the legitimate users. We propose the use of honeypots for collecting the trend of malicious commands, and to train character-level machine learning models for masquerade detection. In this paper, we provide a profiling of 1,314,834 commands collected in 173 days with our honeypot in 2021. We also provide our evaluation with Logistic Regression and several configurations of 1D-CNN and 2D-CNN, using the honeypot commands and legitimate commands collected from 32 users on 27 servers. The evaluation results indicate that 1D-CNN(shallow) and 2D-CNN(large) models provide a good performance regarding detection rate and false positive rate. Even when the trends of honeypot commands changed, the detection rate were almost 100% and the false positive rate were 0.0% regarding the two models.