Ben Salem et al., 2009 - Google Patents
Masquerade attack detection using a search-behavior modeling approachBen Salem et al., 2009
View PDF- Document ID
- 5799401479366281645
- Author
- Ben Salem M
- Stolfo S
- Publication year
External Links
Snippet
Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper …
- 238000001514 detection method 0 title description 30
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Salem et al. | Modeling user search behavior for masquerade detection | |
Shu et al. | Unearthing stealthy program attacks buried in extremely long execution paths | |
US9870455B2 (en) | System level user behavior biometrics using feature extraction and modeling | |
Falcão et al. | Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection | |
Salem et al. | A survey of insider attack detection research | |
Pusara et al. | User re-authentication via mouse movements | |
US9311476B2 (en) | Methods, systems, and media for masquerade attack detection by monitoring computer user behavior | |
Ben Salem et al. | Masquerade attack detection using a search-behavior modeling approach | |
Stolfo et al. | A comparative evaluation of two algorithms for windows registry anomaly detection | |
Shahzad et al. | In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS | |
Song et al. | System level user behavior biometrics using Fisher features and Gaussian mixture models | |
An et al. | Behavioral anomaly detection of malware on home routers | |
Osareh et al. | Intrusion detection in computer networks based on machine learning algorithms | |
Kim et al. | Byte frequency based indicators for crypto-ransomware detection from empirical analysis | |
Kamra et al. | Mechanisms for database intrusion detection and response | |
Baich et al. | Machine Learning for IoT based networks intrusion detection: a comparative study | |
Chenet et al. | A survey on hardware-based malware detection approaches | |
Rawat et al. | On the use of singular value decomposition for a fast intrusion detection system | |
Kundu et al. | Database intrusion detection using sequence alignment | |
Raissi-Dehkordi et al. | A multi-perspective approach to insider threat detection | |
Salem et al. | A comparison of one‐class bag‐of‐words user behavior modeling techniques for masquerade detection | |
Baniya et al. | Intelligent Anomaly Detection System Based on Ensemble and Deep Learning | |
Salem et al. | Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems | |
Ben Salem et al. | Modeling user search behavior for masquerade detection | |
Garcia-Cervigon et al. | Browser function calls modeling for banking malware detection |