The Windows-Users and -Intruder simulations Logs dataset (WUIL): An experimental framework for masquerade detection mechanisms

被引:25
作者
Benito Camina, J. [1 ]
Hernandez-Gracidas, Carlos [1 ]
Monroy, Raul [1 ]
Trejo, Luis [1 ]
机构
[1] Tecnol Monterrey, Dept Comp Sci, Atizapan 52926, Estado De Mexic, Mexico
关键词
Masquerade dataset; Masquerade detection; Computer security; KEYSTROKE; AUTHENTICATION;
D O I
10.1016/j.eswa.2013.08.022
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We introduce a new masquerade dataset, called Windows-Users and -Intruder simulations Logs (WUIL), which, unlike existing datasets, involves more faithful masquerade attempts. While building WUIL, we have worked under the hypothesis that the way in which a user navigates her file system structure can neatly separate a masquerade attack. Thus, departing from standard practice, we state that it is not a user action, but the object upon which the action is carried out what distinguishes user participation. We shall argue that this approach, based on file system navigation provides a richer means, and at a higher-level of abstraction, for building novel models for masquerade detection. We shall devote an important part of this paper to describe WUIL's content: what information about user activity is stored and how it is represented; prominent characteristics of the participant users; the kinds of masquerade attacks to be timely detected; and the way they have been simulated. We shall argue that WUIL provides reliable data for experimenting on close to real-life instances of masquerade detection, as well as for conducting fair comparisons on rival detection mechanisms, hoping it will be of use to the research community. As a side contribution of this paper, we use WUIL to conduct a simple comparison of two masquerade detection methods: one based on SVM, and the other based on KNN. While this comparison experiment is not central to the paper, we expect it to motivate research exploring deeper the masquerade detection problem, and spreading the use of WUIL. In a similar vein, we provide directions for further research, hinting on how to use the features contained in WUIL, and hoping others would find them appealing. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:919 / 930
页数:12
相关论文
共 23 条
[1]   User authentication through typing biometrics features [J].
Araújo, LCF ;
Sucupira, LHR ;
Lizárraga, MG ;
Ling, LL ;
Yabu-Uti, JBT .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) :851-855
[2]  
Ben Salem M, 2011, LECT NOTES COMPUT SC, V6961, P181, DOI 10.1007/978-3-642-23644-0_10
[3]  
Bertacchini M., 2008, C IB SEG U REP UR, P46
[4]   COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS [J].
BLEHA, S ;
SLIVINSKY, C ;
HUSSIEN, B .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) :1217-1222
[5]  
Chen Kuan-Ta., 2007, Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games, P7, DOI DOI 10.1145/1326257.1326259
[6]  
Chinchani R., 2004, P 20 ANN COMP SEC AP, P189
[7]   Web-based keystroke dynamics identity verification using neural network [J].
Cho, S ;
Han, C ;
Han, DH ;
Kim, HI .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) :295-307
[8]   Profiling users in GUI based systems for masquerade detection [J].
Garg, Ashish ;
Rahalkar, Ragini ;
Upadhyaya, Shambhu ;
Kwiat, Kevin .
2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, :48-+
[9]  
Greenberg S., 1998, 8833345 U CALG DEP C
[10]  
Haider S, 2000, IEEE SYS MAN CYBERN, P1336, DOI 10.1109/ICSMC.2000.886039