Salem et al., 2008 - Google Patents
Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX SystemsSalem et al., 2008
View PDF- Document ID
- 499937973427867115
- Author
- Salem M
- Stolfo S
- Publication year
External Links
Snippet
This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that use a set of features to reveal user intent. The specific objective is to model user command profiles and detect deviations indicating a masquerade attack. The approach …
- 238000001514 detection method 0 title description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/3015—Redundancy elimination performed by the file system
- G06F17/30156—De-duplication implemented within the file system, e.g. based on file segments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
- G06F3/04883—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for entering handwritten data, e.g. gestures, text
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wang et al. | One-class training for masquerade detection | |
Salem et al. | A survey of insider attack detection research | |
Stolfo et al. | A comparative evaluation of two algorithms for windows registry anomaly detection | |
Ahmed et al. | Detecting Computer Intrusions Using Behavioral Biometrics. | |
Kadiyala et al. | Hardware performance counter-based fine-grained malware detection | |
Ben Salem et al. | Masquerade attack detection using a search-behavior modeling approach | |
Osareh et al. | Intrusion detection in computer networks based on machine learning algorithms | |
Dolesi et al. | A machine learning approach to ransomware detection using opcode features and k-nearest neighbors on windows | |
Guevara et al. | Data leakage detection algorithm based on task sequences and probabilities | |
Kamra et al. | Mechanisms for database intrusion detection and response | |
Salem et al. | Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. | |
Costante et al. | Hunting the unknown: White-box database leakage detection | |
Chenet et al. | A survey on hardware-based malware detection approaches | |
Prigodichi et al. | Advanced autonomous detection of ransomware using dynamic crypto-entropy signature analysis | |
Babu et al. | Network intrusion detection using machine learning algorithms | |
Murakami et al. | Toward evaluating re-identification risks in the local privacy model | |
Taylor et al. | Rapid ransomware detection through side channel exploitation | |
Kundu et al. | Database intrusion detection using sequence alignment | |
Salem et al. | A comparison of one‐class bag‐of‐words user behavior modeling techniques for masquerade detection | |
Salem et al. | Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems | |
Baniya et al. | Intelligent Anomaly Detection System Based on Ensemble and Deep Learning | |
Gautam et al. | Anomaly detection system using entropy based technique | |
Shrivastava et al. | A review of intrusion detection technique by soft computing and data mining approach | |
Grimmer et al. | Intrusion detection on system call graphs | |
Nalavade | Using machine learning and statistical models for intrusion detection |