Masquerade attacks based on user's profile

  • Authors:
  • IváN S. Razo-Zapata;Carlos Mex-Perera;RaúL Monroy

  • Affiliations:
  • Department of Electrical and Computer Engineering, ITESM, Campus Monterrey, Av. Eugenio Garza Sada 2501 Sur, Col. Tecnológico, Monterrey, N.L., CP 64849, Mexico;Department of Electrical and Computer Engineering, ITESM, Campus Monterrey, Av. Eugenio Garza Sada 2501 Sur, Col. Tecnológico, Monterrey, N.L., CP 64849, Mexico;Computer Science Department, ITESM, Campus Estado de México, Carretera al lago de Guadalupe, Km. 3.5, Estado de México, CP 52926, Mexico

  • Venue:
  • Journal of Systems and Software
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a set of methods for building masquerade attacks. Each method takes into account the profile of the user to be impersonated, thus capturing an intruder strategy. Knowledge about user behavior is extracted from several statistics, including the frequency at which a user types a specific group of commands. It is then expressed by rules, which are applied to synthesize computer sessions that mimic the attack as ordinary user behavior. The masquerade attack datasets have been validated by making a set of Intrusion Detection Systems (IDS) try to detect user impersonation, this way showing the capabilities of each masquerade synthesis method for evading detection. Results demonstrate that a better performance of masquerade attacks can be obtained by using methods based on behavioral rules rather than those based only on a single statistic. Summing up, masquerade attacks exhibit a good strategy for bypassing an IDS.