DocumentCode :
2279769
Title :
Intrusion behavior detection through visualization
Author :
Erbacher, Robert F.
Author_Institution :
Dept. of Comput. Sci., Albany Univ., NY, USA
Volume :
3
fYear :
2003
fDate :
5-8 Oct. 2003
Firstpage :
2507
Abstract :
As computer and network intrusions become more and more of a concern, the need for better capabilities to assist in the detection and analysis of intrusions also increases. We propose a methodology for analyzing network and computer log information visually based on the analysis of user behavior. Each user´s behavior is the key to determining their intent and overriding goals, whether they attempt to hide their actions or not. Proficient hackers will attempt to hide their ultimate goal, which hinders the reliability of log file analysis. Visually analyzing the user´s behavior, however, is much more adaptable and difficult to counteract. This paper will discuss how user behavior can be exhibited within the visualization techniques, the capabilities provided by the environment, typical characteristics users should look out for (i.e., how unusual behavior exhibits itself), and exploration paradigms effective for identifying the meaning behind the user´s behavior.
Keywords :
computer crime; data visualisation; reliability; user interfaces; computer intrusions; computer log information; hackers; intrusion behavior detection; log file analysis; network intrusions; network log information; reliability; user behavior analysis; visualization techniques; Computer hacking; Computer network reliability; Computer networks; Computer science; Computer security; Forensics; Information analysis; Intrusion detection; Pattern matching; Visualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Systems, Man and Cybernetics, 2003. IEEE International Conference on
ISSN :
1062-922X
Print_ISBN :
0-7803-7952-7
Type :
conf
DOI :
10.1109/ICSMC.2003.1244260
Filename :
1244260
Link To Document :
بازگشت