Plan-based simulation of malicious intruders on a computer system [electronic resource]

The problem addressed by this work was to reduce the time taken to train system administrators in detecting computer security problems in system audit logs. The approach taken was to develop a simulator which generates realistic audit logs that illustrate both non-malicious and malicious behavior. T...

Full description

Bibliographic Details
Main Author: Roberts, Christopher C.
Other Authors: Neil P. Rowe.
Language:en_US
Published: Monterey, California. Naval Postgraduate School 2013
Online Access:http://hdl.handle.net/10945/35075
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-35075
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-350752014-11-27T16:18:55Z Plan-based simulation of malicious intruders on a computer system [electronic resource] Roberts, Christopher C. Neil P. Rowe. Computer Science The problem addressed by this work was to reduce the time taken to train system administrators in detecting computer security problems in system audit logs. The approach taken was to develop a simulator which generates realistic audit logs that illustrate both non-malicious and malicious behavior. These logs can be used to train system administrators. The simulator was written in Prolog and used means-ends analysis to simulate seventeen combinations of general system functions which includes the following: logins, editing, file deletions, file copying, changing file access rights, obtaining superuser privileges, sending mail and logouts. The simulation manipulates virtual system files analogously to what real users do. This creates realistic audit file logs that include a mixture of normal and malicious activity. More impressive is that the entire source program requires only 19.1 kbytes of space, making it small enough to be compatible with a personal computer. 2013-08-13T22:06:20Z 2013-08-13T22:06:20Z 1995-03 Thesis http://hdl.handle.net/10945/35075 en_US This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California. Naval Postgraduate School
collection NDLTD
language en_US
sources NDLTD
description The problem addressed by this work was to reduce the time taken to train system administrators in detecting computer security problems in system audit logs. The approach taken was to develop a simulator which generates realistic audit logs that illustrate both non-malicious and malicious behavior. These logs can be used to train system administrators. The simulator was written in Prolog and used means-ends analysis to simulate seventeen combinations of general system functions which includes the following: logins, editing, file deletions, file copying, changing file access rights, obtaining superuser privileges, sending mail and logouts. The simulation manipulates virtual system files analogously to what real users do. This creates realistic audit file logs that include a mixture of normal and malicious activity. More impressive is that the entire source program requires only 19.1 kbytes of space, making it small enough to be compatible with a personal computer.
author2 Neil P. Rowe.
author_facet Neil P. Rowe.
Roberts, Christopher C.
author Roberts, Christopher C.
spellingShingle Roberts, Christopher C.
Plan-based simulation of malicious intruders on a computer system [electronic resource]
author_sort Roberts, Christopher C.
title Plan-based simulation of malicious intruders on a computer system [electronic resource]
title_short Plan-based simulation of malicious intruders on a computer system [electronic resource]
title_full Plan-based simulation of malicious intruders on a computer system [electronic resource]
title_fullStr Plan-based simulation of malicious intruders on a computer system [electronic resource]
title_full_unstemmed Plan-based simulation of malicious intruders on a computer system [electronic resource]
title_sort plan-based simulation of malicious intruders on a computer system [electronic resource]
publisher Monterey, California. Naval Postgraduate School
publishDate 2013
url http://hdl.handle.net/10945/35075
work_keys_str_mv AT robertschristopherc planbasedsimulationofmaliciousintrudersonacomputersystemelectronicresource
_version_ 1716725440262963200