Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade detection may serve as a means of building more secure and dependable systems that authenticate legitimate users by their behavior. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by modeling user search behavior to detect deviations indicating a masquerade attack. We hypothesize that each individual user knows their own file system well enough to search in a limited, targeted and unique fashion in order to find information germane to their current task. Masqueraders, on the other hand, will likely not know the file system and layout of another user's de...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are a common security problem that is a consequence of identity theft. This paper...
Abstract—Masquerade attacks are a common security problem that is a consequence of identity theft. M...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
Masquerade attacks are characterized by an adversary stealing a legitimate user's credentials and us...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are a common security problem that is a consequence of identity theft. This paper...
Abstract—Masquerade attacks are a common security problem that is a consequence of identity theft. M...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
Masquerade attacks are characterized by an adversary stealing a legitimate user's credentials and us...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
In modern computer systems, usernames and passwords have been by far the most common forms of authen...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Real-world data collection poses an important challenge in the security field. Insider and masquerad...