{"title":"基于协方差矩阵法的掩码检测技术","authors":"Reshma Raveendran, K. Dhanya","doi":"10.1109/I2CT.2014.7092165","DOIUrl":null,"url":null,"abstract":"In masquerade attack, the attacker access legitimate user's computer and impersonates that legitimate user. It can be the most serious form of computer abuse. Since masquerade detection is an anomaly based intrusion detection, a legitimate user profile is created and detection is done based on this user profile. In this paper, User profile is created from covariance matrices. A noticeable deviation from legitimate user profile is classified as masquerade attack. The work is done on the Schonlau dataset [1]. The experiment with attack features and legitimate features is conducted and it provides 100% accuracy rate for both attack data and legitimate data.","PeriodicalId":384966,"journal":{"name":"International Conference for Convergence for Technology-2014","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Covariance matrix method based technique for masquerade detection\",\"authors\":\"Reshma Raveendran, K. Dhanya\",\"doi\":\"10.1109/I2CT.2014.7092165\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In masquerade attack, the attacker access legitimate user's computer and impersonates that legitimate user. It can be the most serious form of computer abuse. Since masquerade detection is an anomaly based intrusion detection, a legitimate user profile is created and detection is done based on this user profile. In this paper, User profile is created from covariance matrices. A noticeable deviation from legitimate user profile is classified as masquerade attack. The work is done on the Schonlau dataset [1]. The experiment with attack features and legitimate features is conducted and it provides 100% accuracy rate for both attack data and legitimate data.\",\"PeriodicalId\":384966,\"journal\":{\"name\":\"International Conference for Convergence for Technology-2014\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-04-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference for Convergence for Technology-2014\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/I2CT.2014.7092165\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference for Convergence for Technology-2014","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/I2CT.2014.7092165","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Covariance matrix method based technique for masquerade detection
In masquerade attack, the attacker access legitimate user's computer and impersonates that legitimate user. It can be the most serious form of computer abuse. Since masquerade detection is an anomaly based intrusion detection, a legitimate user profile is created and detection is done based on this user profile. In this paper, User profile is created from covariance matrices. A noticeable deviation from legitimate user profile is classified as masquerade attack. The work is done on the Schonlau dataset [1]. The experiment with attack features and legitimate features is conducted and it provides 100% accuracy rate for both attack data and legitimate data.