Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by presenting one-class Hellinger distance-based and one-class SVM modeling techniques that use a set of novel features to reveal user intent. The specific objective is to model user search profiles and detect deviations indicating a masquerade attack. We hypothesize that each individual user knows their own file system well enough to search in a limited, targeted and unique fashion in order to find information germane to their current task. Masqueraders, on the oth...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
In recent years, dynamic user verification has become one of the basic pillars for insider threat de...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade...
Abstract—Masquerade attacks are a common security problem that is a consequence of identity theft. M...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
We extend prior research on masquerade detection using UNIX commands issued by users as the audit so...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
In recent years, dynamic user verification has become one of the basic pillars for insider threat de...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade...
Abstract—Masquerade attacks are a common security problem that is a consequence of identity theft. M...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
We extend prior research on masquerade detection using UNIX commands issued by users as the audit so...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
In recent years, dynamic user verification has become one of the basic pillars for insider threat de...