Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
碩士 === 國立中央大學 === 資訊管理研究所 === 95 === Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior”...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2007
|
Online Access: | http://ndltd.ncl.edu.tw/handle/51867213261125340934 |
id |
ndltd-TW-095NCU05396045 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-095NCU053960452015-10-13T13:59:55Z http://ndltd.ncl.edu.tw/handle/51867213261125340934 Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems 以支援向量機技術偵測微軟作業系統中非授權使用之研究 Chun-Hao Lai 賴俊豪 碩士 國立中央大學 資訊管理研究所 95 Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior” in recent papers. After that we propose a view about “too large”, “include too many system information” in dataset that used for building normal user behavior model. It brings information security analyzer a lot of inconvenient in Microsoft Window OS environment.Then, we reference the thought, “Window Title”, and recommend a kind of dataset. The proposed dataset takes advantage of “few dataset”, “distinguish anomaly user behavior”.Finally, we use “Support Vector Machine” to verify the effect, and give some experimental results to explain the cuts of the dataset in our proposed system. 陳奕明 2007 學位論文 ; thesis 51 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國立中央大學 === 資訊管理研究所 === 95 === Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior” in recent papers. After that we propose a view about “too large”, “include too many system information” in dataset that used for building normal user behavior model. It brings information security analyzer a lot of inconvenient in Microsoft Window OS environment.Then, we reference the thought, “Window Title”, and recommend a kind of dataset. The proposed dataset takes advantage of “few dataset”, “distinguish anomaly user behavior”.Finally, we use “Support Vector Machine” to verify the effect, and give some experimental results to explain the cuts of the dataset in our proposed system.
|
author2 |
陳奕明 |
author_facet |
陳奕明 Chun-Hao Lai 賴俊豪 |
author |
Chun-Hao Lai 賴俊豪 |
spellingShingle |
Chun-Hao Lai 賴俊豪 Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems |
author_sort |
Chun-Hao Lai |
title |
Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems |
title_short |
Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems |
title_full |
Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems |
title_fullStr |
Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems |
title_full_unstemmed |
Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems |
title_sort |
using svm technique to detect unauthorized use under windows operating systems |
publishDate |
2007 |
url |
http://ndltd.ncl.edu.tw/handle/51867213261125340934 |
work_keys_str_mv |
AT chunhaolai usingsvmtechniquetodetectunauthorizeduseunderwindowsoperatingsystems AT làijùnháo usingsvmtechniquetodetectunauthorizeduseunderwindowsoperatingsystems AT chunhaolai yǐzhīyuánxiàngliàngjījìshùzhēncèwēiruǎnzuòyèxìtǒngzhōngfēishòuquánshǐyòngzhīyánjiū AT làijùnháo yǐzhīyuánxiàngliàngjījìshùzhēncèwēiruǎnzuòyèxìtǒngzhōngfēishòuquánshǐyòngzhīyánjiū |
_version_ |
1717746871121739776 |