메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 48-54

Profiling users in GUI based systems for masquerade detection

Author keywords

GUI based profiling; Intrusion detection; Masquerade detection

Indexed keywords

COMPUTER CRIME; DEMODULATION; LEARNING SYSTEMS; MICE (COMPUTER PERIPHERALS); MONITORING; NUMERICAL METHODS;

EID: 33845948788     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (53)

References (34)
  • 1
    • 33845964140 scopus 로고    scopus 로고
    • Cyber Security: A Crisis of Prioritization, February 2005. A Technical Report by President's Information Technology Advisory Committee (PITAC).
    • "Cyber Security: A Crisis of Prioritization," February 2005. A Technical Report by President's Information Technology Advisory Committee (PITAC).
  • 4
    • 0003893616 scopus 로고
    • Requirements and Model for IDES - A Real-time Intrusion Detection System
    • Computer Science Laboratory, SRI International, Menlo Park, CA
    • D. E. Denning and P. G. Neumann, "Requirements and Model for IDES - A Real-time Intrusion Detection System," tech. rep., Computer Science Laboratory, SRI International, Menlo Park, CA, 1985.
    • (1985) tech. rep
    • Denning, D.E.1    Neumann, P.G.2
  • 5
    • 0003027845 scopus 로고    scopus 로고
    • An Application of Machine Learning to Anomaly Detection
    • Gaithersburgh, MD, pp, The National Institute of Standards and Technology and the National Computer Security Center
    • T. Lane and C. E. Brodley, "An Application of Machine Learning to Anomaly Detection," in Proceedings of Twentieth National Information Systems Security Conference, vol. 1, (Gaithersburgh, MD), pp. 366-380, 1997. The National Institute of Standards and Technology and the National Computer Security Center.
    • (1997) Proceedings of Twentieth National Information Systems Security Conference , vol.1 , pp. 366-380
    • Lane, T.1    Brodley, C.E.2
  • 8
    • 0012282403 scopus 로고    scopus 로고
    • M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, and M. T. andY. Vardi, Computer Intrusion: Detecting Masquerades, in Statistical Science, 16, pp. 58-74, 2001.
    • M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, and M. T. andY. Vardi, "Computer Intrusion: Detecting Masquerades," in Statistical Science, vol. 16, pp. 58-74, 2001.
  • 16
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion Detection Using Sequences of System Calls
    • S. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 17
    • 0032676506 scopus 로고    scopus 로고
    • A Data Mining Framework for Building Intrusion Detection Models
    • W. Lee, S. Stolfo, and K. Mok, "A Data Mining Framework for Building Intrusion Detection Models," in IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
    • (1999) IEEE Symposium on Security and Privacy , pp. 120-132
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 20
    • 0029267472 scopus 로고
    • State Transition Analysis: A Rule-Based Intrusion Detection Approach
    • K. Ilgun, R. Kemmerer, and P. Porras, "State Transition Analysis: A Rule-Based Intrusion Detection Approach," Software Engineering, vol. 21, no. 3, pp. 181-199, 1995.
    • (1995) Software Engineering , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, R.2    Porras, P.3
  • 21
    • 0036095845 scopus 로고    scopus 로고
    • Y. Li, N. Wu, S. Jajodia, and S. Wang, Enhancing Profiles for Anomaly Detection Using Time Granularities, Journal of Computer Security, 10, no. 1,2, pp. 137-157, 2002.
    • Y. Li, N. Wu, S. Jajodia, and S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities," Journal of Computer Security, vol. 10, no. 1,2, pp. 137-157, 2002.
  • 26
    • 0028714365 scopus 로고
    • Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring
    • K. Levitt, G. Ko, and G. Fink, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," in Computer Security Application Conference, 1994.
    • (1994) Computer Security Application Conference
    • Levitt, K.1    Ko, G.2    Fink, G.3
  • 27
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behavior of a program using multiple-length N-grams
    • Ballycotton, County Cork, Ireland, pp
    • G. Marceau, "Characterizing the behavior of a program using multiple-length N-grams," in Proceedings of the 2000 workshop on New security paradigms, (Ballycotton, County Cork, Ireland), pp. 101-110, 2000.
    • (2000) Proceedings of the 2000 workshop on New security paradigms , pp. 101-110
    • Marceau, G.1
  • 28
    • 84944239503 scopus 로고    scopus 로고
    • Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report
    • C. Michael and A. Ghosh, "Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report," Lecture Notes in Computer Science, vol. 1907, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1907
    • Michael, C.1    Ghosh, A.2
  • 32
    • 84957069814 scopus 로고    scopus 로고
    • Text Categorization with Support Vector Machines: Learning with many relevant features
    • Springer Verlag, Heidelberg, DE
    • T. Joachims, "Text Categorization with Support Vector Machines: Learning with many relevant features," in Proceedings of ECML-98, 10th European Conference on Machine Learning, no. 1398, pp. 137-142, Springer Verlag, Heidelberg, DE, 1998.
    • (1998) Proceedings of ECML-98, 10th European Conference on Machine Learning , vol.1398 , pp. 137-142
    • Joachims, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.