Implementation and operation aspects of a system for detecting abnormally level of user activity
- 23 Downloads
The present paper discusses various aspects of embedding the intrusion detection system based on the personal adaptive behavior profile into the existing complex information system. The paper proposes the classification of types of access to the target information infrastructure in order to assess the feasibility of the established system integration. The criteria for evaluating the effectiveness of the implementation of the established system are also described. A method for calculating the dynamic threshold level of abnormality is proposed in the present research. The paper also considers a technique of adjusting the sensitivity of the system in case of abnormal user behavior. The paper describes the approach used for system scaling in case of an increase in the intensity of the incoming requests.
Keywordsanomalous activity detection personal behavior profile dynamic abnormality threshold anomaly detection system scaling
Unable to display preview. Download preview PDF.
- 1.Viswanath, B., et al., Towards detecting anomalous user behavior in online social networks, 23rd USENIX Security Symposium (USENIX Security 14), 2014, pp. 223–238.Google Scholar
- 2.Ted, E., et al., Detecting insider threats in a real corporate database of computer usage activity, Proc. 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 2013, pp. 1393–1401.Google Scholar
- 3.Young, W.T., et al., Use of domain knowledge to detect insider threats in computer activities, Security and Privacy Workshops (SPW), IEEE, 2013, pp. 60–67.Google Scholar
- 4.Markov, A.A., Theory of Algorithms, Moscow, 1954.Google Scholar
- 5.Osipov, P.A. and Borisov, A.N., System for anomalous activity detection based on Markov models, Autom. Control Comput. Sci., 2011, vol. 45, no. 2, pp. 46–60.Google Scholar
- 9.Shirai, K., Interest Rate Risk Modeling Using Extended Lognormal Distribution with Variable Volatility, Stochastic Modeling, International Actuarial Association, 2010.Google Scholar
- 14.Sevens, R., White, A., Dosanjh, S., et al., Scientific Grand Challenges: Architectures and Technology for Extreme-Scale Computing Report, 2011.Google Scholar
- 15.Rupali, A. and Aggarwal, R.R., Modeling and querying data in Mongodb, Int. J. Sci. Eng. Res., 2013, vol. 4, no. 7, pp. 141–144.Google Scholar