Abstract—Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade detection may serve as a means of building more secure and dependable systems that authenticate legitimate users by their behavior. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper extends prior work by modeling user search behavior to detect deviations indi-cating a masquerade attack. We hypothesize that each individual user knows their own file system well enough to search in a limited, targeted and unique fashion in order to find information germane to their current task. Masqueraders, on the other hand, will likely not know the file system and layout of another...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
Part 8: Probabilistic Attacks and Protection (Short Papers)International audienceMasquerade attack r...
The complexity of modern computer networks creates a number of information security challenges for o...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...
Abstract. Masquerade attacks are a common security problem that is a consequence of identity theft. ...
Masquerade attacks are a common security problem that is a consequence of identity theft. Masquerade...
Masquerade attacks are a common security problem that is a consequence of identity theft. Prior work...
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity t...
Data theft has been the main goal of the cybercrime community for many years, and more and more so a...
Abstract. Masquerade attacks are characterized by an adversary stealing a legitimate user’s credenti...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that us...
Abstract. Masqueraders in computer intrusion detection are people who use somebody else’s computer a...
An Intrusion Detection System is a technical system that is designed to identify and respond again...
Part 8: Probabilistic Attacks and Protection (Short Papers)International audienceMasquerade attack r...
The complexity of modern computer networks creates a number of information security challenges for o...
Masquerade attacks pose a grave security problem that is a consequence of identity theft. Detecting ...
In this paper, we consider the problem of masquerade detection based on a UNIX system. A masquerader...
Abstract:-We present an algorithm used to detect a masquerader at pre-event scenario based on user p...