Abstract
Information is the most important asset for institutions, and thus ensuring optimal levels of security for both operations and users is essential. For this research, during Shell sessions, the history of nine users (0–8) who performed tasks using the UNIX operating system for a period of two years was investigated. The main objective was to generate a classification model of usage profiles to detect anomalous behaviors in the system of each user. As an initial task, the information was preprocessed, which generates user sessions \( S_{m}^{u}\), where u identifies the user and m the number of sessions the user has performed u. Each session \( S_{m}^{u} \) contains a script execution sequence \( C_{n} \), that is \( S_{m}^{u} \) = {\( C_{1} , C_{2} ,C_{3} \),…, \( C_{n} \)}, where n is the position where the \( C_{n} \) command was executed. Supervised and unsupervised data mining techniques and algorithms were applied to this data set as well as voracious algorithms, such as the Greedy Stepwise algorithm, for attribute selection. Next, a Genetic Algorithm with a Neural Network model was trained to the set of sessions \( S_{m}^{u} \) to generate a unique behavior profile for each user. In this way, the anomalous or intrusive behaviors of each user were identified in a more approximate and efficient way during the execution of activities using the computer systems. The results obtained indicate an optimum pressure and an acceptable false positive rate.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001, vol. 2, pp. 307–321 (2001)
Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213–217 (2016)
Al-Mousa, Z., Nasir, Q.: cl-CIDPS: a cloud computing based cooperative intrusion detection and prevention system framework. Commun. Comput. Inf. Sci. 523, 181–194 (2015)
Martínez-Estudillo, F.J., Hervás-Martínez, C., Gutiérrez, P.A., Martínez-Estudillo, A.C.: Evolutionary product-unit neural networks classifiers. Neurocomputing 72(1–3), 548–561 (2008)
Al-Zewairi, M., Almajali, S., Awajan, A.: Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: Proceedings - 2017 International Conference on New Trends in Computing Sciences, ICTCS 2017 (2018)
Disseny D’algorismes,A.I., Teresa, M., Soriano, A.: Algoritmos Voraces
Sow, M.T.: Using ANOVA to examine the relationship between safety & security and human development. J. Int. Bus. Econ. 2(4), 2194–2374 (2014)
Lunden, O., Backstrom, M.: Stirrer efficiency in FOA reverberation chambers. Evaluation of correlation coefficients and chi-squared tests. In: IEEE International Symposium on Electromagnetic Compatibility, vol. 1, pp. 11–16 (2000)
Yang, J., Zhao, H., Chen, X.: Genetic algorithm optimized training for neural network spectrum prediction. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 2949–2954 (2016)
Idrissi, M., Ramchoun, H., Ghanou, Y., Ettaouil, M.: Genetic algorithm for neural network architecture optimization. In: 2016 3rd International Conference on Logistics Operations Management (GOL), pp. 1–4 (2016)
Jenab, A,, Sari Sarraf, I., Green, D., Rahmaan, T., Worswick, M.: The use of genetic algorithm and neural network to predict rate-dependent tensile flow behaviour of AA5182-O sheets. Mater. Des. 94, 262–273 (2016). https://doi.org/10.1016/j.matdes.2016.01.038
Noersasongko, E., Julfia, F.T., Syukur, A., Purwanto, P., Pramunendar, R.A., Supriyanto, C.: A Tourism arrival forecasting using a genetic algorithm based neural network. Indian J. Sci. Technol. 9(4), 1–5 (2016)
Nagrikar, A., Nandagawali, S.,. Bhandarkar, A, Patle, N., Singnapure, S.: Three Way Dynamic Pricing Technique for e-Commerce Website, 2, 31, (2018)
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Hidalgo, J., Guevara, C., Yandún, M. (2020). Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-52581-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-52580-4
Online ISBN: 978-3-030-52581-1
eBook Packages: EngineeringEngineering (R0)