DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade Attack

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395 -0056

Volume: 04 Issue: 04 | Apr -2017

p-ISSN: 2395-0072

www.irjet.net

DDSGA: A Data-Driven semi-global Alignment Approach for detecting masquerade attack Miss.Choudhar Poonam R., Miss.Dhawade Pranita P., Miss.Khomane Shilpa I. Guided By: Prof. Nale R.K. Department of Information Technology, SVPM's College of Engg. Malegaon(BK), Savitribai Phule, Pune University, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract- A masquerade aggressor impersonates a legal user to utilize the user services and privileges. The semiglobal alignment algorithmic program (SGA) is one in all the foremost effective and economical techniques to watch these attacks but it isn't reached nonetheless the accuracy and performance required by large scale, multiuser systems. to boost every the effectiveness and additionally the performances of this algorithmic program, we tend to propose the Data-Driven Semi-Global Alignment, DDSGA approach. From the protection effectiveness scan purpose, DDSGA improves the rating systems by adopting distinct alignment parameters for each user. Moreover, it tolerates very {little} mutations in user command sequences by allowing little changes among the low-level illustration of the commands utility. It collectively adapts to changes among the user behaviour by change the signature of a user in line with its current behaviour. To optimize the runtime overhead, DDSGA minimizes the alignment overhead and parallelizes the detection and additionally the update. Key words: Data-Driven Semi-Global Alignment Approach, Semi-Global Alignment, Full Parallelized Mode, Top Matching Based Overlapping.

host-based IDS remains the state-of-the art to discover these attacks. Attacks that don't leave associate degree audit path within the target system could also be discovered by analyzing the user behaviors through masquerade detection. At first, masquerade detection builds a profile for every user by gathering data like login time, location, session period, CPU time, commands Issued, user ID and user information processing address.

2. LITERATURE SURVEY A. “A detection-oriented classification of insider it misuses”[1]: This though the matter of business executive misuse of IT systems is often recognized within the results of laptop security surveys, it's less wide accounted for in structure security practices and obtainable countermeasures. Indeed, the opportunities for business executive misuse, by perpetrators with licitly assigned privileges, square measure usually unnoted till a happening happens. A potential reason for this is often that the matter receives comparatively very little attention within the ordinarily recognized classifications of ITrelated attackers and intrusions, with most focusing upon attacks and strategies involving some variety of system penetration and/or unauthorized access. This paper examines the potential styles of business executive misuse in additional detail, classifying them in keeping with the amount inside in an exceedingly target system at that the incidents can be detected. It’s thought of that such associate degree approach might offer a relevant foundation in terms of later approaches to change business executive misuse detection strategies.

1. INTRODUCTION A participant is associate degree aggressor United Nations agency authenticates as a legal user by stealing its credentials or by violating the authentication service. Associate degree business executive participant may be a system user that misuses his/her privileges to access distinct accounts and perform unauthorized actions. Associate degree outsider aims to utilize all the privileges of a legal user. Different implementations of this attack do exist, like duplication or ex-filtration of user parole, installation of software package with backdoors or malicious code, eavesdropping and packet sniffing, spoofing and social engineering attacks. These attacks could leave some path in log _les that, when the very fact, is joined to some user. During this case, a log analysis by

© 2017, IRJET

|

Impact Factor value: 5.181

B. “Sequence alignment for masquerade detection”[2]: The masquerade attack, wherever Associate in Nursing assailant takes on the identity of a legitimate user to maliciously utilize that user privileges, poses a significant threat to the safety of knowledge systems. Such

|

ISO 9001:2008 Certified Journal

| Page 587


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.