[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ben Salem et al., 2009 - Google Patents

Masquerade attack detection using a search-behavior modeling approach

Ben Salem et al., 2009

View PDF
Document ID
5799401479366281645
Author
Ben Salem M
Stolfo S
Publication year

External Links

Snippet

Masquerade attacks are unfortunately a familiar security problem that is a consequence of identity theft. Detecting masqueraders is very hard. Prior work has focused on user command modeling to identify abnormal behavior indicative of impersonation. This paper …
Continue reading at academiccommons.columbia.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Salem et al. Modeling user search behavior for masquerade detection
Shu et al. Unearthing stealthy program attacks buried in extremely long execution paths
US9870455B2 (en) System level user behavior biometrics using feature extraction and modeling
Falcão et al. Quantitative comparison of unsupervised anomaly detection algorithms for intrusion detection
Salem et al. A survey of insider attack detection research
Pusara et al. User re-authentication via mouse movements
US9311476B2 (en) Methods, systems, and media for masquerade attack detection by monitoring computer user behavior
Ben Salem et al. Masquerade attack detection using a search-behavior modeling approach
Stolfo et al. A comparative evaluation of two algorithms for windows registry anomaly detection
Shahzad et al. In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux OS
Song et al. System level user behavior biometrics using Fisher features and Gaussian mixture models
An et al. Behavioral anomaly detection of malware on home routers
Osareh et al. Intrusion detection in computer networks based on machine learning algorithms
Kim et al. Byte frequency based indicators for crypto-ransomware detection from empirical analysis
Kamra et al. Mechanisms for database intrusion detection and response
Baich et al. Machine Learning for IoT based networks intrusion detection: a comparative study
Chenet et al. A survey on hardware-based malware detection approaches
Rawat et al. On the use of singular value decomposition for a fast intrusion detection system
Kundu et al. Database intrusion detection using sequence alignment
Raissi-Dehkordi et al. A multi-perspective approach to insider threat detection
Salem et al. A comparison of one‐class bag‐of‐words user behavior modeling techniques for masquerade detection
Baniya et al. Intelligent Anomaly Detection System Based on Ensemble and Deep Learning
Salem et al. Masquerade Detection Using a Taxonomy-Based Multinomial Modeling Approach in UNIX Systems
Ben Salem et al. Modeling user search behavior for masquerade detection
Garcia-Cervigon et al. Browser function calls modeling for banking malware detection