SlideShare a Scribd company logo
Security:
User behavior profiling
In this, the characteristics of information accessed by a particular user is studied. These
characteristics may include when, how and how much. The user’s activity
Introduction Intrusion detection systems (IDS) are special security mechanisms to protect
computer systems from stream of harmful activities. Since the amount of attacks against
computer systems increases regularly, it is very important for the system to be able to detect
novel attacks as accurately as previously known attacks. For this reason, there have been
developed numerous techniques to discover that a system has an intruder inside. Though, a lot of
existing systems have many problems, and the perfect system or method is far from being
invented yet. Basically, IDS are categorized into misuse or signature based detection and
anomaly detection (AD) [6]. The misuse detection method can recognize only known attacks
based on the available signature of the particular attack type. It usually performs its job quite
accurately with no false alarms to be raised. However, this method is not effective for detecting
previously unknown intrusions, whose signatures have not provided. Conversely, an anomaly
based method is able to detect entirely new intrusions, since it does not scan for particular
patterns, but is based on the normal activities of the system and looks for any variations from
them. 1.1 Anomaly Intrusion Detection (AID) AD technique overcomes the constraint of misuse
detection, since it does not take attack behaviors as its framework. Yet, it concentrates on normal
system behaviors which reside in a profile and then looks for variations between current
activities and the statistical model of previous behaviors [6]. Therefore, current system activities,
which are different from the profile (i.e. irregular) can be classified as potential intrusions. Same,
AD is not able to distinguish whether irregular activities are intrusions or just unusual but legal
ones, and so non-intrusion can be labeled as intrusion. Consequently, it generates a large amount
of false alarms. Also it is powerless to identify and classify the specific type of detected
intrusions, and there are a few different types of such systems depending on the kind of
intrusions they look for [6]. However, the main drawback of AD is a possibility for an intrusive
behavior to be a part of the normal behaviors if the attack occurs while creating a normal
behavior profile. That can happen if a profile is created under the assumption that no intrusions
have been detected in an experiential system during the training period. Because of this,
nowadays the main goal of AD is increasing the number of detected attacks and at the same time
reducing the amount of false alarms. To meet the goal, it is essential to choose a proper set of
features in order to build a user’s behavior profile [4, 5]. 1.2 Users’ Activities Profiling in UNIX
Profiling is a technique of grouping individuals into categories based on certain features.
Profiling computer users is widely utilized in the realm of computer security and particularly in
AID. For an accurate detection of anomalies in user behavior the normal behavior profile must
be formed to satisfy to system characteristics. A user’s behavior profile in UNIX can be build
upon different parameters, which can be acquired from the logfile. To profile users, characteristic
sequences of actions (UNIX commands) generated by users are studied [10]. It has been
demonstrated [11] that the login host, the login time, the UNIX command set, and the command
execution time can be used to profile a user with a high degree of accuracy. As well, different
system parameters such as memory usage, page fault usage, buffer overflow, etc can be
considered in user’s activities profiling.

More Related Content

PPTX
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
PPTX
Data base security and injection
PPT
Security testing vikesh kumar
PDF
Pertemuan 14 keamanan sistem operasi
PPT
Electronic health records
PDF
Dynamic Access Control for RBAC-administered web-based Databases
PPTX
Security & Protection in Operating System
DOC
Analysis of field data on web security vulnerabilities
LTS Secure User Entity Behavior Analytics(UEBA) boon to Cyber Security
Data base security and injection
Security testing vikesh kumar
Pertemuan 14 keamanan sistem operasi
Electronic health records
Dynamic Access Control for RBAC-administered web-based Databases
Security & Protection in Operating System
Analysis of field data on web security vulnerabilities

What's hot (19)

PDF
Alert logic anatomy owasp infographic
PDF
Basic survey on malware analysis, tools and techniques
PDF
Autonomic Anomaly Detection System in Computer Networks
PDF
Unisys_AppDefender_Symantec_CFD_0_1_final
PPTX
What is penetration testing and why is it important for a business to invest ...
PDF
A Review Report on Security Threats on Database
PPT
Security Software
PPTX
System Security- Firewalls and ID System
PPTX
Website security
PDF
OWASP Top 10 Overview
PPTX
Self protecteion in clustered distributed system new
PPT
Windows Security in Operating System
PDF
Survey on Malware Detection Techniques
DOCX
JPA1404 Context-based Access Control Systems for Mobile Devices
PDF
Get Ahead of your Next Security Breach
PPTX
operating system
PPTX
OPERATING SYSTEM
PDF
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
PDF
Top ten database_threats
Alert logic anatomy owasp infographic
Basic survey on malware analysis, tools and techniques
Autonomic Anomaly Detection System in Computer Networks
Unisys_AppDefender_Symantec_CFD_0_1_final
What is penetration testing and why is it important for a business to invest ...
A Review Report on Security Threats on Database
Security Software
System Security- Firewalls and ID System
Website security
OWASP Top 10 Overview
Self protecteion in clustered distributed system new
Windows Security in Operating System
Survey on Malware Detection Techniques
JPA1404 Context-based Access Control Systems for Mobile Devices
Get Ahead of your Next Security Breach
operating system
OPERATING SYSTEM
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile...
Top ten database_threats
Ad

Similar to Security raw (20)

PPT
Idps
PDF
The Practical Data Mining Model for Efficient IDS through Relational Databases
DOCX
Ids 013 detection approaches
PDF
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
PDF
BAIT1103 Chapter 7
PDF
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
PDF
D0261019025
PDF
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
PDF
M0446772
DOCX
Ids 014 anomaly detection
PDF
Review of Intrusion and Anomaly Detection Techniques
PPT
Intrusion Detection Systems
PPTX
Lecture 10 intruders
PDF
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
PDF
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
PDF
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
PDF
Enhanced method for intrusion detection over kdd cup 99 dataset
PDF
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Idps
The Practical Data Mining Model for Efficient IDS through Relational Databases
Ids 013 detection approaches
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
BAIT1103 Chapter 7
A BAYESIAN CLASSIFICATION ON ASSET VULNERABILITY FOR REAL TIME REDUCTION OF F...
D0261019025
Current Studies On Intrusion Detection System, Genetic Algorithm And Fuzzy Logic
M0446772
Ids 014 anomaly detection
Review of Intrusion and Anomaly Detection Techniques
Intrusion Detection Systems
Lecture 10 intruders
Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring (#Secur...
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
AN IMPROVED METHOD TO DETECT INTRUSION USING MACHINE LEARNING ALGORITHMS
A Study and Comparative analysis of Conditional Random Fields for Intrusion d...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
Enhanced method for intrusion detection over kdd cup 99 dataset
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Ad

More from HarshitParkar6677 (20)

PPTX
Wi fi hacking
PPT
D dos attack
DOCX
Notes chapter 6
DOC
Interface notes
PPTX
Chapter6 2
PPTX
PPT
8086 cpu 1
DOC
Chapter 6 notes
DOC
Chapter 5 notes
PPTX
Chap6 procedures & macros
DOC
Chapter 5 notes new
DOCX
Notes arithmetic instructions
DOCX
Notes all instructions
DOCX
Notes aaa aa
DOCX
Notes 8086 instruction format
PPTX
Copy of 8086inst logical
PPT
Copy of 8086inst logical
PPTX
Chapter3 program flow control instructions
PPTX
Chapter3 8086inst stringsl
Wi fi hacking
D dos attack
Notes chapter 6
Interface notes
Chapter6 2
8086 cpu 1
Chapter 6 notes
Chapter 5 notes
Chap6 procedures & macros
Chapter 5 notes new
Notes arithmetic instructions
Notes all instructions
Notes aaa aa
Notes 8086 instruction format
Copy of 8086inst logical
Copy of 8086inst logical
Chapter3 program flow control instructions
Chapter3 8086inst stringsl

Recently uploaded (20)

PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PPTX
UNIT 4 Total Quality Management .pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
Construction Project Organization Group 2.pptx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Geodesy 1.pptx...............................................
PPT
Project quality management in manufacturing
CH1 Production IntroductoryConcepts.pptx
bas. eng. economics group 4 presentation 1.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
UNIT 4 Total Quality Management .pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
UNIT-1 - COAL BASED THERMAL POWER PLANTS
CYBER-CRIMES AND SECURITY A guide to understanding
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
OOP with Java - Java Introduction (Basics)
Construction Project Organization Group 2.pptx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Operating System & Kernel Study Guide-1 - converted.pdf
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Geodesy 1.pptx...............................................
Project quality management in manufacturing

Security raw

  • 1. Security: User behavior profiling In this, the characteristics of information accessed by a particular user is studied. These characteristics may include when, how and how much. The user’s activity Introduction Intrusion detection systems (IDS) are special security mechanisms to protect computer systems from stream of harmful activities. Since the amount of attacks against computer systems increases regularly, it is very important for the system to be able to detect novel attacks as accurately as previously known attacks. For this reason, there have been developed numerous techniques to discover that a system has an intruder inside. Though, a lot of existing systems have many problems, and the perfect system or method is far from being invented yet. Basically, IDS are categorized into misuse or signature based detection and anomaly detection (AD) [6]. The misuse detection method can recognize only known attacks based on the available signature of the particular attack type. It usually performs its job quite accurately with no false alarms to be raised. However, this method is not effective for detecting previously unknown intrusions, whose signatures have not provided. Conversely, an anomaly based method is able to detect entirely new intrusions, since it does not scan for particular patterns, but is based on the normal activities of the system and looks for any variations from them. 1.1 Anomaly Intrusion Detection (AID) AD technique overcomes the constraint of misuse detection, since it does not take attack behaviors as its framework. Yet, it concentrates on normal system behaviors which reside in a profile and then looks for variations between current activities and the statistical model of previous behaviors [6]. Therefore, current system activities, which are different from the profile (i.e. irregular) can be classified as potential intrusions. Same, AD is not able to distinguish whether irregular activities are intrusions or just unusual but legal ones, and so non-intrusion can be labeled as intrusion. Consequently, it generates a large amount of false alarms. Also it is powerless to identify and classify the specific type of detected intrusions, and there are a few different types of such systems depending on the kind of intrusions they look for [6]. However, the main drawback of AD is a possibility for an intrusive behavior to be a part of the normal behaviors if the attack occurs while creating a normal behavior profile. That can happen if a profile is created under the assumption that no intrusions have been detected in an experiential system during the training period. Because of this, nowadays the main goal of AD is increasing the number of detected attacks and at the same time reducing the amount of false alarms. To meet the goal, it is essential to choose a proper set of features in order to build a user’s behavior profile [4, 5]. 1.2 Users’ Activities Profiling in UNIX Profiling is a technique of grouping individuals into categories based on certain features. Profiling computer users is widely utilized in the realm of computer security and particularly in AID. For an accurate detection of anomalies in user behavior the normal behavior profile must be formed to satisfy to system characteristics. A user’s behavior profile in UNIX can be build upon different parameters, which can be acquired from the logfile. To profile users, characteristic sequences of actions (UNIX commands) generated by users are studied [10]. It has been demonstrated [11] that the login host, the login time, the UNIX command set, and the command
  • 2. execution time can be used to profile a user with a high degree of accuracy. As well, different system parameters such as memory usage, page fault usage, buffer overflow, etc can be considered in user’s activities profiling.