• DSpace Universidad Indoamerica
  • Publicaciones Científicas
  • Artículos Científicos Indexados
  • Please use this identifier to cite or link to this item: https://repositorio.uti.edu.ec//handle/123456789/3430
    Title: Mathematical model of intrusion detection based on sequential execution of commands applying pagerank
    Authors: Guevara-Maldonado, César
    Hidalgo, Jairo
    Yandún, Marco
    Arias-Flores, Hugo
    Zapata-Saavedra, Lorena
    Ramírez-Morales, Iván
    Aguilar-Galvez, Fernando
    Chalco-Torres, Lorena
    Pimbosa-Ortiz, Dioselina
    Issue Date: 2020
    Publisher: Advances in Intelligent Systems and Computing. Volume 960, Pages 122 - 130. AHFE International Conference on Human Factors in Cybersecurity, 2019. Washington D.C. 24 July 2019 through 28 July 2019
    Abstract: Cybersecurity in networks and computer systems is a very important research area for companies and institutions around the world. Therefore, safeguarding information is a fundamental objective, because data is the most valuable asset of a person or company. Users interacting with multiple systems generate a unique behavioral pattern for each person (called digital fingerprint). This behavior is compiled with the interactions between the user and the applications, websites, communication equipment (PCs, mobile phones, tablets, etc.). In this paper the analysis of eight users with computers with a UNIX operating system, who have performed their tasks in a period of 2 years, is detailed. This data is the history of use in Shell sessions, which are sorted by date and token. With this information a mathematical model of intrusion detection based on time series behaviors is generated. To generate this model a data pre-processing is necessary, which it generates user sessions (Equation presented), where u identifies the user and m the number of sessions the user u has made. Each session (Equation presented) contains a sequence of execution of commands (Equation presented), that is (Equation presented), where n is the position in wich the C command was executed. Only 17 commands have been selected, which are the most used by each user u. In the creation of the mathematical model we apply the page Rank algorithm [1], the same that within a command execution session (Equation presented), determines which command (Equation presented) calls another command (Equation presented), and determines which command is the most executed. For this study we will perform a model with sb subsequences of two commands, (Equation presented), where the algorithm is applied and we obtain a probability of execution per command defined by (Equation presented). Finally, a profile is generated for each of the users as a signal in time series, where maximum and minimum normal behavior is obtained. If any behavior is outside those ranges, it is determined as intrusive behavior, with a detection probability value. Otherwise, it is determined that the behavior is normal and can continue executing commands in a normal way. The results obtained in this model have shown that the proposal is quite effective in the testing phase, with an accuracy rate greater than 90% and a false positive rate of less than 4%. This shows that our model is effective and adaptable to the dynamic behavior of the user. On the other hand, a variability in the execution of user commands has been found to be quite high in periods of short time, but the proposed algorithm tends to adapt quite optimally. © Springer Nature Switzerland AG 2020.
    URI: https://link.springer.com/chapter/10.1007/978-3-030-20488-4_12
    http://repositorio.uti.edu.ec//handle/123456789/3430
    Appears in Collections:Artículos Científicos Indexados

    Files in This Item:
    There are no files associated with this item.


    This item is licensed under a Creative Commons License Creative Commons