PEI Qing-qi1, ZHAO Peng2, ZHANG Hong-bin3, et al. Study on user’s identification system in insider threats[J]. 2009, 30(S2): 121-126.DOI:
内部威胁身份鉴别系统的研究
摘要
监控用户的异常行为是进行冒充检测的一种有效途径
将这种方法应用到内部威胁的身份鉴别当中
用基于TAN的贝叶斯网络建立反映用户行为特征的进程信息模型
当用户行为偏离特征模型时
可以有效判断出用户的身份。实验结果表明
通过监控用户调用的进程名称和相应的进程数可以很好检测冒充攻击并且能够识别攻击者的身份。
Abstract
Monitoring user’s abnormal behaviors
which is an effective method to detect impersonation
is used for im-personation detection in insider threats.A model is built by using TAN-based Bayesian network to reflect the characteris-tics of user’s behavior.When the deviation from the model is found
the system can determine the identity of the user.As a result
experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker.