• DocumentCode
    3435992
  • Title

    Identification of anomalous network security token usage via clustering and density estimation

  • Author

    Harang, Richard E. ; Glodek, William J.

  • Author_Institution
    ICF Int. U.S. Army Res. Lab., Adelphi, MD, USA
  • fYear
    2012
  • fDate
    21-23 March 2012
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Fraudulent use of network security tokens is a serious concern for any system that contains data that must be secured against illicit access, duplication, or manipulation. Anomaly-based techniques to classify logins as fraudulent or legitimate have been proposed and used successfully, however the lack of clear mathematical structure in the space of IP addresses means that many of these methods require significant supplemental information such as payload, failed token usages, or user activity upon the secured network in order to achieve accurate detection rates. When this additional information is not available, such as in network-based intrusion detection systems, many systems to detect fraudulent security token usage require a series of usages before a classification can be made. We present an anomaly detection system based upon IP addresses, a mapping of geographic location as inferred from IP address, and usage timestamps that is capable of identifying fraudulent token usage with as little as a single instance of fraudulent usage while overcoming the often significant limitations in geographic IP address mappings.
  • Keywords
    IP networks; computer network security; pattern clustering; token networks; IP address; anomalous network security token usage identification; clustering estimation; density estimation; geographic IP address mapping; geographic location; mathematical strncture; Geology; IP networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Sciences and Systems (CISS), 2012 46th Annual Conference on
  • Conference_Location
    Princeton, NJ
  • Print_ISBN
    978-1-4673-3139-5
  • Electronic_ISBN
    978-1-4673-3138-8
  • Type

    conf

  • DOI
    10.1109/CISS.2012.6310829
  • Filename
    6310829