We extend prior research on masquerade detection using UNIX commands issued by users as the audit source. Previous studies using multi-class training requires gathering data from multiple users to train specific profiles of self and non-self for each user. One-class training uses data representative of only one user. We apply one-class Naïve Bayes using both the multivariate Bernoulli model and the Multinomial model, and the one class SVM algorithm. The result shows that one-class training for this task works as well as multi-class training, with the great practical advantages of collecting much less data and more efficient training. One-class SVM using binary features performs best among the one-class training algorithms
One-class classifiers employing for training only the data from one class are justified when the dat...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are characterized by an adversary stealing a legitimate user's credentials and us...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Insider threat detection is still a relatively new area of study in Computer Science. Perhaps the mo...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Masquerade attacks are a common security problem that is a consequence of identity theft. This paper...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
One-class classifiers employing for training only the data from one class are justified when the dat...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are characterized by an adversary stealing a legitimate user's credentials and us...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Insider threat detection is still a relatively new area of study in Computer Science. Perhaps the mo...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Masquerade attacks are a common security problem that is a consequence of identity theft. This paper...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
One-class classifiers employing for training only the data from one class are justified when the dat...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
Spoofing attacks on biometric systems can seriously compromise their practical utility. In this pape...