Insider threat detection is still a relatively new area of study in Computer Science. Perhaps the most thoroughly researched topic is in the area of masquerade detection. A masquerader is someone posing as a specific legitimate user when they are really another person. Several different ways of determining the presence of a masquerader have been proposed and researched, but there are significant problems including low detection rates and high false positive results. Roy Maxion and Kevin Killourhy utilized a Naive Bayes classifier for detection using enriched Unix command lines, which are command line entries that still contain flags and other data. They discovered a problem with users that they dubbed supermasqueraders. These were users tha...
Masquerade detection is the ability to detect attackers known as masqueraders that intrude on anothe...
We extend prior research on masquerade detection using UNIX commands issued by users as the audit so...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
reeves at eos.ncsu.edu Insiders are authorized persons who possess special privi-leges of access; th...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
Masquerade detection is the ability to detect attackers known as masqueraders that intrude on anothe...
We extend prior research on masquerade detection using UNIX commands issued by users as the audit so...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Masqueraders are people who impersonate other people on a computer system and they pose threat to th...
A masquerader is an attacker who has obtained access to a legitimate user’s computer and is pretendi...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
reeves at eos.ncsu.edu Insiders are authorized persons who possess special privi-leges of access; th...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
Masqueraders are a category of intruders who impersonate other people on a computer system and use t...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
Masquerade detection is the ability to detect attackers known as masqueraders that intrude on anothe...
We extend prior research on masquerade detection using UNIX commands issued by users as the audit so...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...