Skip to main content

Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity (AHFE 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1219))

Included in the following conference series:

Abstract

Information is the most important asset for institutions, and thus ensuring optimal levels of security for both operations and users is essential. For this research, during Shell sessions, the history of nine users (0–8) who performed tasks using the UNIX operating system for a period of two years was investigated. The main objective was to generate a classification model of usage profiles to detect anomalous behaviors in the system of each user. As an initial task, the information was preprocessed, which generates user sessions \( S_{m}^{u}\), where u identifies the user and m the number of sessions the user has performed u. Each session \( S_{m}^{u} \) contains a script execution sequence \( C_{n} \), that is \( S_{m}^{u} \) = {\( C_{1} , C_{2} ,C_{3} \),…, \( C_{n} \)}, where n is the position where the \( C_{n} \) command was executed. Supervised and unsupervised data mining techniques and algorithms were applied to this data set as well as voracious algorithms, such as the Greedy Stepwise algorithm, for attribute selection. Next, a Genetic Algorithm with a Neural Network model was trained to the set of sessions \( S_{m}^{u} \) to generate a unique behavior profile for each user. In this way, the anomalous or intrusive behaviors of each user were identified in a more approximate and efficient way during the execution of activities using the computer systems. The results obtained indicate an optimum pressure and an acceptable false positive rate.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Swiler, L.P., Phillips, C., Ellis, D., Chakerian, S.: Computer-attack graph generation tool. In: Proceedings - DARPA Information Survivability Conference and Exposition II, DISCEX 2001, vol. 2, pp. 307–321 (2001)

    Google Scholar 

  2. Farnaaz, N., Jabbar, M.A.: Random forest modeling for network intrusion detection system. Procedia Comput. Sci. 89, 213–217 (2016)

    Article  Google Scholar 

  3. Al-Mousa, Z., Nasir, Q.: cl-CIDPS: a cloud computing based cooperative intrusion detection and prevention system framework. Commun. Comput. Inf. Sci. 523, 181–194 (2015)

    Google Scholar 

  4. Martínez-Estudillo, F.J., Hervás-Martínez, C., Gutiérrez, P.A., Martínez-Estudillo, A.C.: Evolutionary product-unit neural networks classifiers. Neurocomputing 72(1–3), 548–561 (2008)

    Article  Google Scholar 

  5. Al-Zewairi, M., Almajali, S., Awajan, A.: Experimental evaluation of a multi-layer feed-forward artificial neural network classifier for network intrusion detection system. In: Proceedings - 2017 International Conference on New Trends in Computing Sciences, ICTCS 2017 (2018)

    Google Scholar 

  6. Disseny D’algorismes,A.I., Teresa, M., Soriano, A.: Algoritmos Voraces

    Google Scholar 

  7. Sow, M.T.: Using ANOVA to examine the relationship between safety & security and human development. J. Int. Bus. Econ. 2(4), 2194–2374 (2014)

    Article  MathSciNet  Google Scholar 

  8. Lunden, O., Backstrom, M.: Stirrer efficiency in FOA reverberation chambers. Evaluation of correlation coefficients and chi-squared tests. In: IEEE International Symposium on Electromagnetic Compatibility, vol. 1, pp. 11–16 (2000)

    Google Scholar 

  9. Yang, J., Zhao, H., Chen, X.: Genetic algorithm optimized training for neural network spectrum prediction. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), pp. 2949–2954 (2016)

    Google Scholar 

  10. Idrissi, M., Ramchoun, H., Ghanou, Y., Ettaouil, M.: Genetic algorithm for neural network architecture optimization. In: 2016 3rd International Conference on Logistics Operations Management (GOL), pp. 1–4 (2016)

    Google Scholar 

  11. Jenab, A,, Sari Sarraf, I., Green, D., Rahmaan, T., Worswick, M.: The use of genetic algorithm and neural network to predict rate-dependent tensile flow behaviour of AA5182-O sheets. Mater. Des. 94, 262–273 (2016). https://doi.org/10.1016/j.matdes.2016.01.038

  12. Noersasongko, E., Julfia, F.T., Syukur, A., Purwanto, P., Pramunendar, R.A., Supriyanto, C.: A Tourism arrival forecasting using a genetic algorithm based neural network. Indian J. Sci. Technol. 9(4), 1–5 (2016)

    Article  Google Scholar 

  13. Nagrikar, A., Nandagawali, S.,. Bhandarkar, A, Patle, N., Singnapure, S.: Three Way Dynamic Pricing Technique for e-Commerce Website, 2, 31, (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Jairo Hidalgo , Cesar Guevara or Marco Yandún .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hidalgo, J., Guevara, C., Yandún, M. (2020). Generation of User Profiles in UNIX Scripts Applying Evolutionary Neural Networks. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52581-1_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52580-4

  • Online ISBN: 978-3-030-52581-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics