Paper
19 March 2009 Research on immune storage anomaly detection via user access behavior
Jianzhong Huang, Yunliang Chen, Yunfu Fang
Author Affiliations +
Proceedings Volume 7125, Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage; 71251H (2009) https://doi.org/10.1117/12.821631
Event: Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage, 2008, Wuhan, China
Abstract
If an intruder uses a stolen account, the authentication sub-system will regard the intruder as a legitimate user. In order to filter out such illegal users, the storage system should be capable of the user activity diagnosis. This paper presents a novel anomaly detection scheme to monitor the user access activities using the artificial immune technique. When an access request violates the access control rule, it is regarded as Non-self, so as to provide some early warning tips to the storage security sub-system. Compared with the NIDS, the proposed scheme targets the anomaly detection at storage level and focuses on the read/write data requests. In the prophase of simulation, a set of optimal parameters of algorithm are fitted according to the mean convergence speed and detection efficiency. The simulation shows the proposed scheme can reach rather high detection rate and low false alarm rate, further validating its feasibility. Thus the storage anomaly detection would strengthen the storage early warning and improve the storage security.
© (2009) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jianzhong Huang, Yunliang Chen, and Yunfu Fang "Research on immune storage anomaly detection via user access behavior", Proc. SPIE 7125, Eighth International Symposium on Optical Storage and 2008 International Workshop on Information Data Storage, 71251H (19 March 2009); https://doi.org/10.1117/12.821631
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Detection and tracking algorithms

Sensors

Data storage

Artificial intelligence

Data modeling

Computer security

Network security

Back to Top