Implementing an Anomaly-Based Intrusion Detection System: Focus on Internal Threat – Masquerade Attacks
John Tucker, Matthew K. Coughlan, Thomas Nelson, Benjamin Klimkowski

Abstract
Intrusion Detection Systems (IDS) are systems that detect actions on a network that attempt to compromise the confidentiality, integrity, or availability of a resource (Berge). In this research, we attempt to study anomalybased IDSs. This project will attempt to determine an optimal method for detecting internal attacks. Anomalybased IDS rely upon the ability to detect a significant difference in activity on a network during an attack from the normal activity. A key task for this research will be creating a baseline model of the normal activity of users on a network based upon our “training” data. After we achieve a baseline model, we will then test our model on data that contains possible intrusions. The internal threat portion of the paper will focus on modeling user activity in order to detect attacks, specifically masquerade attacks. Masquerade attacks are “attacks in which one system entity illegitimately poses as another entity” (Berge).

Full Text: PDF

Copyright © 2014: www.aijcrnet.com. All Rights Reserved.