期刊论文详细信息
IEEE Access 卷:6
Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management
Zhaoli Liu1  Tao Qin1  Xiaohong Guan2  Chao He2  Shancang Li3 
[1] Key Laboratory for Intelligent Networks and Network Security, Ministry of Education, Xi&x2019;
[2] an Jiaotong University, Xi&x2019;
[3] an, China;
关键词: System management;    behavior rhythm;    clustering;    NMF;    anomaly detection and tracing;   
DOI  :  10.1109/ACCESS.2018.2882812
来源: DOAJ
【 摘 要 】

The widespread use of social media, cloud computing, and Internet of Things generates massive behavior data recorded by system logs, and how to utilize these data to improve the stability and security of these systems becomes more and more difficult due to the increasing number of users and amount of data. In this paper, we propose a novel model named behavior rhythm (BR) to characterize and visualize the user’s behaviors from the massive logs and apply it to the system security management. Based on the BR model, we conduct the clustering analysis to mine the user clusters. Different management and access control policies can be applied to different clusters to improve the management efficiency. Then, we apply the non-negative matrix factorization method to analyze the BRs and perform abnormal detection, and employ the BR similarity calculation to perform fast potential anomaly tracking. The detection and tracing results can help the administrators to control the threats efficiently. Experimental results based on the datasets collected from the campus network center of Xi’an Jiaotong University verify the accuracy and efficiency of our method in user behavior profiling and security management, which lay a solid foundation for improving system stability and quality of service.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次