Detection of Masquerade Attack by Data Driven Semi Global Alignment Approach

Authors

  • Snehal G.Sarade  Department of Computer Engineering, T.A.E. Kondhwa, Maharashtra, India
  • Gorakh R. Bankar  Department of Computer Engineering, T.A.E. Kondhwa, Maharashtra, India
  • Yogeshwari B. Narsale  Department of Computer Engineering, T.A.E. Kondhwa, Maharashtra, India

Keywords:

Masquerade attack, sequence alignment,mismatch alignment, security, intrusion attack

Abstract

Masquerade attackers behave like a authorized user to utilize user requirements. The semi-global alignment algorithm (SGA) is one of the most optimize and unique techniques to find out these attack but it has not extend the correctness and executions required by large scope, multiuser systems. To increase all the accuracy and the execution of this algorithm, we recommend the Data-Driven Semi-Global Alignment, DDSGA approach. For security purpose, DDSGA improve the scoring systems by altering various alignment arguments for each user. like wise, it allow small replacement in user command series by assinging small suitable different in the low-level showing of the command to ability to perform a task . It seems to make appropriate changes in the client using technique by updating the pattern of the a user as per to its current using technique. To fix the runtime located, DDSGA to make as little the alignment context and parallelizes the search out and to update. After showing the DDSGA phases, we show the experimental outputs. This output is to represent that DDSGA get the high hit ratio of 88.4% with low wrong positive rate. It improves the hit ratio of advanced SGA and minimizes Maxion-Townsend cost. So, DDSGA results in improving all the hit ratio and false positive rates with a capable calculation context.

References

  1. T., S. E. Coulla and B. K. Szymanski, “Sequence alignment for masquerade detection,” J. Comput. Statist. Data Anal., vol. 52, no. 8, pp. 4116?4131, Apr. 2008.
  2. T. Lane and C. E. Brodley, “An application of machine learning to anomaly detection,” in Proc. 20th Nat. Inf. Syst. Security Conf., 1997, pp. 366?380.
  3. B. Christopher, “A tutorial on support vector machines for pattern recognition,” Data Mining Knowl. Discovery, vol. 2, no. 2, pp. 121?167, 1998.
  4. Hisham. A. Kholidy and Fabrizio Baiardi, “CIDD: A cloud intrusion detection data set for cloud computing and masquerade attacks,” in Proc. 9th Int. Conf. Inf. Technol.: New Generations, Las Vegas, NV, USA, Apr. 2012, pp. 16?18.
  5. S. Malek and S. Salvatore, “Detecting masqueraders: A comparison of one-class bag-of-words user behavior modeling techniques,” in Proc. 2nd Int. Workshop Managing Insider SecurityThreats, Morioka, Iwate, Japan. Jun. 2010, pp. 3?13.
  6. B. Szymanski and Y. Zhang, “Recursive data mining for masquerade detection and author identification,” in Proc. IEEE 5th Syst., Man .Cybern. Inf. Assurance Workshop, West Point, NY, USA, Jun.2004, pp. 424?431.
  7. Subrat Kumar Dash, K. S. Reddy, and K. A. Pujari, “Adaptive Naive Bayes method for masquerade detection”, Security Commun.Netw., vol. 4, no. 4, pp. 410?417, 2011.
  8. A. Sharma and K. K. Paliwal, “Detecting masquerades using combination of Na??ve Bayes and weighted RBF approach,” J. Comput.Virology, vol. 3, no. 3, pp, 237?245, 2007.

Downloads

Published

2017-06-30

Issue

Section

Research Articles

How to Cite

[1]
Snehal G.Sarade, Gorakh R. Bankar, Yogeshwari B. Narsale, " Detection of Masquerade Attack by Data Driven Semi Global Alignment Approach, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 3, Issue 4, pp.134-140, May-June-2017.