Clustering Based Anomaly Detection In The Complex Interaction Of Human And Computer Systems

Zhongmin Cai,Xiaorong Chu,Xiaoqin Wang,Xiaoming Wang
2006-01-01
Abstract:Human Computer Interface is regarded as a "digital chasm" in computer systems engineering. There are many things that can easily go wrong. This paper focuses on anomaly detection of inappropriate behaviors in the complex human computer interaction process. A method is proposed. to identify the unauthorized users by analyzing their command sequence using clustering techniques. After calculating the frequency vector of the command sequence for different users, the shortest-distance system clustering and the longest-distance system clustering methods are applied respectively to find out who are the unauthorized users among the mixed command sequences. The two methods are compared experimentally based on real world data and the effect of the clustering analysis in the intrusion detection is evaluated.
What problem does this paper attempt to address?