DocumentCode :
424500
Title :
UNICORN: Misuse Detection for UNICOS ™
Author :
Christoph, G.G. ; Jackson, K.A. ; Neuman, M.C. ; Siciliano, C.L.B. ; Simmonds, D.D. ; Stallings, C.A. ; Thompson, J.L.
Author_Institution :
Los Alamos National Laboratory
fYear :
1995
fDate :
8-8 Dec. 1995
Firstpage :
56
Lastpage :
56
Abstract :
An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year and a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos´ main computing network, the ICN.
Keywords :
UNICOS; anomaly detection; auditing; computer misuse; computer security; hacking; intrusion detection; security logs; Computer hacking; Computer networks; Computer security; Information security; Intrusion detection; Laboratories; Network servers; Performance analysis; US Department of Energy; Workstations; UNICOS; anomaly detection; auditing; computer misuse; computer security; hacking; intrusion detection; security logs;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Supercomputing, 1995. Proceedings of the IEEE/ACM SC95 Conference
Conference_Location :
San Diego, CA, USA
Print_ISBN :
0-89791-816-9
Type :
conf
DOI :
10.1109/SUPERC.1995.241777
Filename :
1383193
Link To Document :
بازگشت