Title
Model-based Cluster Analysis for Identifying Suspicious Activity Sequences in Software.
Abstract
Large software systems have to contend with a significant number of users who interact with different components of the system in various ways. The sequences of components that are used as part of an interaction define sets of behaviors that users have with the system. These can be large in number. Among these users, it is possible that there are some who exhibit anomalous behaviors -- for example, they may have found back doors into the system and are doing something malicious. These anomalous behaviors can be hard to distinguish from normal behavior because of the number of interactions a system may have, or because traces may deviate only slightly from normal behavior. In this paper we describe a model-based approach to cluster sequences of user behaviors within a system and to find suspicious, or anomalous, sequences. We exploit the underlying software architecture of a system to define these sequences. We further show that our approach is better at detecting suspicious activities than other approaches, specifically those that use unigrams and bigrams for anomaly detection. We show this on a simulation of a large scale system based on Amazon Web application style architecture.
Year
DOI
Venue
2017
10.1145/3041008.3041014
IWSPA@CODASPY
Field
DocType
Citations 
Anomaly detection,Data mining,Computer science,Software system,Exploit,Software,Bigram,Software architecture,Web application,Cluster analysis
Conference
0
PageRank 
References 
Authors
0.34
21
6
Name
Order
Citations
PageRank
hemank lamba118316.59
Thomas J. Glazier231.40
Javier Cámara350344.77
Bradley Schmerl4130875.34
David Garlan57861761.63
Jürgen Pfeffer634626.57