In applying command sequence matching to detect masquerading attack, the first important step is to build a user's profile for characterizing normal behavior. In this paper, we proposed a new approach which applies the comparison of arbitrary length of sessions to distinguish users. In this approach, a session is regarded as an integral comparison unit. This method makes it possible to locate command matches in historical command data for long sequences. The testing results show that the method can be used in creating a user's profile. Further, it will pave the road for future work in applying data mining technology to detect potential masqueraders.Godkänd; 2004; 20080522 (ysko
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
Masquerade attack, which occurs when an intruder assumes the identity of a legitimate user, has beco...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
In applying command sequence matching to detect masquerading attack, the first important step is to ...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. This paper focuses on the study of a new method for de-tecting masqueraders in computer sy...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masqueraders are users who take control of a machine and perform malicious activities such as data e...
We show that masquerade detection, based on sequences of commands executed by the users, can be effe...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
Masquerade attack, which occurs when an intruder assumes the identity of a legitimate user, has beco...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
In applying command sequence matching to detect masquerading attack, the first important step is to ...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. This paper focuses on the study of a new method for de-tecting masqueraders in computer sy...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masqueraders are users who take control of a machine and perform malicious activities such as data e...
We show that masquerade detection, based on sequences of commands executed by the users, can be effe...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
Masquerade attack, which occurs when an intruder assumes the identity of a legitimate user, has beco...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...