We show that masquerade detection, based on sequences of commands executed by the users, can be effectively and efficiently done by the construction of a customized grammar representing the normal behavior of a user. More specifically, we use the Sequitur algorithm to generate a context-free grammar which efficiently extracts repetitive sequences of commands executed by one user – which is mainly used to generate a profile of the user. This technique identifies also the common scripts implicitly or explicitly shared between users – a useful set of data for reducing false positives. During the detection phase, a block of commands is classified as either normal or a masquerade based on its decomposition in substrings using the grammar of the ...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Part 8: Probabilistic Attacks and Protection (Short Papers)International audienceMasquerade attack r...
Deception exists in all aspects of life and is particularly evident on the Web. Deception includes c...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
In applying command sequence matching to detect masquerading attack, the first important step is to ...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade...
Insider threat detection is still a relatively new area of study in Computer Science. Perhaps the mo...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Part 8: Probabilistic Attacks and Protection (Short Papers)International audienceMasquerade attack r...
Deception exists in all aspects of life and is particularly evident on the Web. Deception includes c...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
In applying command sequence matching to detect masquerading attack, the first important step is to ...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade...
Insider threat detection is still a relatively new area of study in Computer Science. Perhaps the mo...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Part 8: Probabilistic Attacks and Protection (Short Papers)International audienceMasquerade attack r...
Deception exists in all aspects of life and is particularly evident on the Web. Deception includes c...