数据挖掘计算机审计日志,检测计算机误用

S. Heatley, James R. Otto
{"title":"数据挖掘计算机审计日志,检测计算机误用","authors":"S. Heatley, James R. Otto","doi":"10.1002/(SICI)1099-1174(199809)7:3%3C125::AID-ISAF146%3E3.0.CO;2-L","DOIUrl":null,"url":null,"abstract":"All computers are vulnerable to misuse either by unauthorized users penetrating the system or by authorized users abusing their privileges. This paper describes the use of a data mining process to sift through large (gigabytes) computer audit log databases to detect potential improper accesses of sensitive data files by authorized users. Computer audit logs record information about what files were accessed by which users and when. The detection of computer misuse is important because computer misuse can be related to acts of computer fraud, information theft, software piracy, and violations of privacy, to name a few. The data mining process described in this paper can be applied to detect possible fraud in a wide variety of situations that share some common characteristics: first, a class of ‘sensitive’ files can be identified which may be subject to improper access; second, the selection of files by users is a random process; and third, the probability that a user-selected file is from the sensitive class should be the same for all members of a group of users. Examples of possible applications of the data mining process include detecting inappropriate accesses to classified files, celebrity files, financial accounts with high balances, and files known to have been improperly used. © 1998 John Wiley & Sons, Ltd.","PeriodicalId":153549,"journal":{"name":"Intell. Syst. Account. Finance Manag.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Data mining computer audit logs to detect computer misuse\",\"authors\":\"S. Heatley, James R. Otto\",\"doi\":\"10.1002/(SICI)1099-1174(199809)7:3%3C125::AID-ISAF146%3E3.0.CO;2-L\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"All computers are vulnerable to misuse either by unauthorized users penetrating the system or by authorized users abusing their privileges. This paper describes the use of a data mining process to sift through large (gigabytes) computer audit log databases to detect potential improper accesses of sensitive data files by authorized users. Computer audit logs record information about what files were accessed by which users and when. The detection of computer misuse is important because computer misuse can be related to acts of computer fraud, information theft, software piracy, and violations of privacy, to name a few. The data mining process described in this paper can be applied to detect possible fraud in a wide variety of situations that share some common characteristics: first, a class of ‘sensitive’ files can be identified which may be subject to improper access; second, the selection of files by users is a random process; and third, the probability that a user-selected file is from the sensitive class should be the same for all members of a group of users. Examples of possible applications of the data mining process include detecting inappropriate accesses to classified files, celebrity files, financial accounts with high balances, and files known to have been improperly used. © 1998 John Wiley & Sons, Ltd.\",\"PeriodicalId\":153549,\"journal\":{\"name\":\"Intell. Syst. Account. Finance Manag.\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Intell. Syst. Account. Finance Manag.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1002/(SICI)1099-1174(199809)7:3%3C125::AID-ISAF146%3E3.0.CO;2-L\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Intell. Syst. Account. Finance Manag.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1002/(SICI)1099-1174(199809)7:3%3C125::AID-ISAF146%3E3.0.CO;2-L","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

所有计算机都容易受到未经授权的用户侵入系统或授权用户滥用其特权的滥用。本文描述了使用数据挖掘过程来筛选大型(千兆字节)计算机审计日志数据库,以检测授权用户对敏感数据文件的潜在不当访问。计算机审计日志记录了哪些用户在何时访问了哪些文件。检测计算机滥用是很重要的,因为计算机滥用可能与计算机欺诈、信息盗窃、软件盗版和侵犯隐私等行为有关。本文中描述的数据挖掘过程可以应用于在具有一些共同特征的各种情况下检测可能的欺诈行为:首先,可以识别一类可能受到不正当访问的“敏感”文件;其次,用户对文件的选择是一个随机的过程;第三,用户选择的文件来自敏感类的概率对于一组用户的所有成员应该是相同的。数据挖掘过程的可能应用示例包括检测对机密文件、名人文件、高余额财务帐户和已知已被不当使用的文件的不适当访问。©1998 John Wiley & Sons, Ltd
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data mining computer audit logs to detect computer misuse
All computers are vulnerable to misuse either by unauthorized users penetrating the system or by authorized users abusing their privileges. This paper describes the use of a data mining process to sift through large (gigabytes) computer audit log databases to detect potential improper accesses of sensitive data files by authorized users. Computer audit logs record information about what files were accessed by which users and when. The detection of computer misuse is important because computer misuse can be related to acts of computer fraud, information theft, software piracy, and violations of privacy, to name a few. The data mining process described in this paper can be applied to detect possible fraud in a wide variety of situations that share some common characteristics: first, a class of ‘sensitive’ files can be identified which may be subject to improper access; second, the selection of files by users is a random process; and third, the probability that a user-selected file is from the sensitive class should be the same for all members of a group of users. Examples of possible applications of the data mining process include detecting inappropriate accesses to classified files, celebrity files, financial accounts with high balances, and files known to have been improperly used. © 1998 John Wiley & Sons, Ltd.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信