[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Salem et al., 2008 - Google Patents

Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems

Salem et al., 2008

View PDF
Document ID
499937973427867115
Author
Salem M
Stolfo S
Publication year

External Links

Snippet

This paper presents one-class Hellinger distance-based and one-class SVM modeling techniques that use a set of features to reveal user intent. The specific objective is to model user command profiles and detect deviations indicating a masquerade attack. The approach …
Continue reading at academiccommons.columbia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30705Clustering or classification
    • G06F17/3071Clustering or classification including class or cluster creation or modification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/3015Redundancy elimination performed by the file system
    • G06F17/30156De-duplication implemented within the file system, e.g. based on file segments
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for entering handwritten data, e.g. gestures, text
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models

Similar Documents

Publication Publication Date Title
Wang et al. One-class training for masquerade detection
Salem et al. A survey of insider attack detection research
Stolfo et al. A comparative evaluation of two algorithms for windows registry anomaly detection
Ahmed et al. Detecting Computer Intrusions Using Behavioral Biometrics.
Kadiyala et al. Hardware performance counter-based fine-grained malware detection
Ben Salem et al. Masquerade attack detection using a search-behavior modeling approach
Osareh et al. Intrusion detection in computer networks based on machine learning algorithms
Dolesi et al. A machine learning approach to ransomware detection using opcode features and k-nearest neighbors on windows
Guevara et al. Data leakage detection algorithm based on task sequences and probabilities
Kamra et al. Mechanisms for database intrusion detection and response
Salem et al. Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques.
Costante et al. Hunting the unknown: White-box database leakage detection
Chenet et al. A survey on hardware-based malware detection approaches
Prigodichi et al. Advanced autonomous detection of ransomware using dynamic crypto-entropy signature analysis
Babu et al. Network intrusion detection using machine learning algorithms
Murakami et al. Toward evaluating re-identification risks in the local privacy model
Taylor et al. Rapid ransomware detection through side channel exploitation
Kundu et al. Database intrusion detection using sequence alignment
Salem et al. A comparison of one‐class bag‐of‐words user behavior modeling techniques for masquerade detection
Salem et al. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems
Baniya et al. Intelligent Anomaly Detection System Based on Ensemble and Deep Learning
Gautam et al. Anomaly detection system using entropy based technique
Shrivastava et al. A review of intrusion detection technique by soft computing and data mining approach
Grimmer et al. Intrusion detection on system call graphs
Nalavade Using machine learning and statistical models for intrusion detection