Intrusion detection via analysis and modelling of user commands

  • Authors:
  • Matthew Gebski;Raymond K. Wong

  • Affiliations:
  • National ICT Australia and School of Computer Science & Engineering, University of New South Wales, Sydney, NSW, Australia;National ICT Australia and School of Computer Science & Engineering, University of New South Wales, Sydney, NSW, Australia

  • Venue:
  • DaWaK'05 Proceedings of the 7th international conference on Data Warehousing and Knowledge Discovery
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Since computers have become a mainstay of everyday life, techniques and methods for detecting intrusions as well as protecting systems and data from unwanted parties have received significant attention recently. We focus on detecting improper use of computer systems through the analysis of user command data. Our approach looks at the structure of the commands used and generates a model which can be used to test new commands. This is accompanied by an analysis of the performance of the proposed approach. Although we focus on commands, the techniques presented in this paper can be extended to allow analysis of other data, such as system calls.