Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

UNICORN: Misuse detection for UNICOS

Conference ·
OSTI ID:114493

An effective method for detecting computer misuse is the automatic auditing and analysis of on-line user activity. This activity is reflected in the system audit record, by changes in the vulnerability posture of the system configuration, and in other evidence found through active testing of the system. In 1989 we started developing an automatic misuse detection system for the Integrated Computing Network (ICN) at Los Alamos National Laboratory. Since 1990 this system has been operational, monitoring a variety of network systems and services. We call it the Network Anomaly Detection and Intrusion Reporter, or NADIR. During the last year and a half, we expanded NADIR to include processing of audit and activity records for the Cray UNICOS operating system. This new component is called the UNICOS Real-time NADIR, or UNICORN. UNICORN summarizes user activity and system configuration information in statistical profiles. In near real-time, it can compare current activity to historical profiles and test activity against expert rules that express our security policy and define improper or suspicious behavior. It reports suspicious behavior to security auditors and provides tools to aid in follow-up investigations. UNICORN is currently operational on four Crays in Los Alamos` main computing network, the ICN.

Research Organization:
Los Alamos National Lab., NM (United States)
Sponsoring Organization:
USDOE, Washington, DC (United States)
DOE Contract Number:
W-7405-ENG-36
OSTI ID:
114493
Report Number(s):
LA-UR--95-1108; CONF-951207--3; ON: DE95009488
Country of Publication:
United States
Language:
English

Similar Records

An automated computer misuse detection system for UNICOS
Conference · Tue Sep 27 00:00:00 EDT 1994 · OSTI ID:10187083

A progress report on UNICOS misuse detection at Los Alamos
Conference · Sun Oct 01 00:00:00 EDT 1995 · OSTI ID:119968

Misuse and intrusion detection at Los Alamos National Laboratory
Conference · Fri Mar 31 23:00:00 EST 1995 · OSTI ID:42500