Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems

碩士 === 國立中央大學 === 資訊管理研究所 === 95 === Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior”...

Full description

Bibliographic Details
Main Authors: Chun-Hao Lai, 賴俊豪
Other Authors: 陳奕明
Format: Others
Language:zh-TW
Published: 2007
Online Access:http://ndltd.ncl.edu.tw/handle/51867213261125340934
id ndltd-TW-095NCU05396045
record_format oai_dc
spelling ndltd-TW-095NCU053960452015-10-13T13:59:55Z http://ndltd.ncl.edu.tw/handle/51867213261125340934 Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems 以支援向量機技術偵測微軟作業系統中非授權使用之研究 Chun-Hao Lai 賴俊豪 碩士 國立中央大學 資訊管理研究所 95 Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior” in recent papers. After that we propose a view about “too large”, “include too many system information” in dataset that used for building normal user behavior model. It brings information security analyzer a lot of inconvenient in Microsoft Window OS environment.Then, we reference the thought, “Window Title”, and recommend a kind of dataset. The proposed dataset takes advantage of “few dataset”, “distinguish anomaly user behavior”.Finally, we use “Support Vector Machine” to verify the effect, and give some experimental results to explain the cuts of the dataset in our proposed system. 陳奕明 2007 學位論文 ; thesis 51 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國立中央大學 === 資訊管理研究所 === 95 === Security damage about “Unauthorized use” are usually be discovered after it happened. And it costs about 50% financial loss in 30% respondents in 2006, CSI/FBI. Because of the popularity of Microsoft Window operation system, we discuss the “anomaly user behavior” in recent papers. After that we propose a view about “too large”, “include too many system information” in dataset that used for building normal user behavior model. It brings information security analyzer a lot of inconvenient in Microsoft Window OS environment.Then, we reference the thought, “Window Title”, and recommend a kind of dataset. The proposed dataset takes advantage of “few dataset”, “distinguish anomaly user behavior”.Finally, we use “Support Vector Machine” to verify the effect, and give some experimental results to explain the cuts of the dataset in our proposed system.
author2 陳奕明
author_facet 陳奕明
Chun-Hao Lai
賴俊豪
author Chun-Hao Lai
賴俊豪
spellingShingle Chun-Hao Lai
賴俊豪
Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
author_sort Chun-Hao Lai
title Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
title_short Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
title_full Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
title_fullStr Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
title_full_unstemmed Using SVM Technique to Detect Unauthorized Use Under Windows Operating Systems
title_sort using svm technique to detect unauthorized use under windows operating systems
publishDate 2007
url http://ndltd.ncl.edu.tw/handle/51867213261125340934
work_keys_str_mv AT chunhaolai usingsvmtechniquetodetectunauthorizeduseunderwindowsoperatingsystems
AT làijùnháo usingsvmtechniquetodetectunauthorizeduseunderwindowsoperatingsystems
AT chunhaolai yǐzhīyuánxiàngliàngjījìshùzhēncèwēiruǎnzuòyèxìtǒngzhōngfēishòuquánshǐyòngzhīyánjiū
AT làijùnháo yǐzhīyuánxiàngliàngjījìshùzhēncèwēiruǎnzuòyèxìtǒngzhōngfēishòuquánshǐyòngzhīyánjiū
_version_ 1717746871121739776