Title :
Recursive data mining for masquerade detection and author identification
Author :
Szymanski, Boleslaw K. ; Zhang, Yongqiang
Author_Institution :
Dept. of Comput. Sci., Rensselaer Polytech. Inst., Troy, NY, USA
Abstract :
In this paper, a novel recursive data mining method based on the simple but powerful model of cognition called a conceptor is introduced and applied to computer security. The method recursively mines a string of symbols by finding frequent patterns, encoding them with unique symbols and rewriting the string using this new coding. We apply this technique to two related but important problems in computer security: (i) masquerade detection to prevent a security attack in which an intruder impersonates a legitimate user to gain access to the resources, and (ii) author identification, in which anonymous or disputed computer session needs to be attributed to one of a set of potential authors. Many methods based on automata theory, hidden Markov models, Bayesian models or even matching algorithms from bioinformatics have been proposed to solve the masquerading detection problem but less work has been done on the author identification. We used recursive data mining to characterize the structure and high-level symbols in user signatures and the monitored sessions. We used one-class SVM to measure the similarity of these two characterizations. We applied weighting prediction scheme to author identification. On the SEA dataset that we used in our experiments, the results were very promising.
Keywords :
authorisation; data mining; digital signatures; Bayesian model; author identification; automata theory; bioinformatics; cognition model; computer security attack; hidden Markov model; intrusion detection; masquerade detection problem; matching algorithm; recursive data mining method; user signature; weighting prediction scheme; Automata; Bayesian methods; Bioinformatics; Cognition; Computer security; Data mining; Encoding; Hidden Markov models; Monitoring; Support vector machines;
Conference_Titel :
Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC
Print_ISBN :
0-7803-8572-1
DOI :
10.1109/IAW.2004.1437848