메뉴 건너뛰기




Volumn 51, Issue 3-4, 2007, Pages 465-475

Insider attack and real-time data mining of user behavior

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MAKING; FINANCE; MATHEMATICAL MODELS; PERSONNEL;

EID: 34547452580     PISSN: 00188646     EISSN: 00188646     Source Type: Journal    
DOI: 10.1147/rd.513.0465     Document Type: Article
Times cited : (10)

References (11)
  • 1
    • 34547399655 scopus 로고    scopus 로고
    • J. P. Anderson, Computer Security Threat Monitoring and Surveillance, Technical Report, James P. Anderson Company, Fort Washington, PA, April 1980; see http://csrc.nist.gov/publications/ history/ande80.pdf.
    • J. P. Anderson, "Computer Security Threat Monitoring and Surveillance," Technical Report, James P. Anderson Company, Fort Washington, PA, April 1980; see http://csrc.nist.gov/publications/ history/ande80.pdf.
  • 2
    • 77952396614 scopus 로고    scopus 로고
    • A Detection-Oriented Classification of Insider IT Misuse
    • Las Vegas, NV, April 14-15
    • A. H. Phyo and S. M. Furnell, "A Detection-Oriented Classification of Insider IT Misuse," Proceedings of the Third Security Conference, Las Vegas, NV, April 14-15, 2004.
    • (2004) Proceedings of the Third Security Conference
    • Phyo, A.H.1    Furnell, S.M.2
  • 3
    • 0023294428 scopus 로고
    • An Intrusion Detection Model
    • D. E. Denning, "An Intrusion Detection Model," IEEE Trans. Software Eng. 13, No. 2, 222-232 (1987).
    • (1987) IEEE Trans. Software Eng , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.E.1
  • 4
    • 0003518833 scopus 로고
    • Classification and Detection of Computer Intrusions,
    • Ph.D. Dissertation, Purdue University, Lafayette, IN, August
    • S. Kumar, "Classification and Detection of Computer Intrusions," Ph.D. Dissertation, Purdue University, Lafayette, IN, August 1995.
    • (1995)
    • Kumar, S.1
  • 5
    • 34547409487 scopus 로고    scopus 로고
    • A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection, Proceedings of the Third SIAM Conference on Data Mining, San Francisco, CA, 2003; see http://www.siam.org/meetings /sdm03/proceedings/sdm03_03.pdf.
    • A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," Proceedings of the Third SIAM Conference on Data Mining, San Francisco, CA, 2003; see http://www.siam.org/meetings /sdm03/proceedings/sdm03_03.pdf.
  • 6
    • 34547401689 scopus 로고    scopus 로고
    • S. Berinato, The Global State of Information Security 2005, September 15, 2005; see http://www.cio.com/archive/091505/ global.html.
    • S. Berinato, "The Global State of Information Security 2005," September 15, 2005; see http://www.cio.com/archive/091505/ global.html.
  • 7
    • 34547397065 scopus 로고    scopus 로고
    • CSO magazine,2005 E-Crime Watche Survey, Summary of Findings; see http://www.cert.org/archive/pdf/ ecrimesummary05.pdf.
    • CSO magazine,"2005 E-Crime Watche Survey, Summary of Findings"; see http://www.cert.org/archive/pdf/ ecrimesummary05.pdf.
  • 8
    • 34547443063 scopus 로고    scopus 로고
    • M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector, Carnegie Mellon University Software Engineering Institute, Technical Report CMU/SEI-2004-TR-021, 2004; see http://www.sei.cmu.edu/publications/documents/04.reports/ 04tr021.html.
    • M. Randazzo, M. Keeney, E. Kowalski, D. Cappelli, and A. Moore, "Insider Threat Study: Illicit Cyber Activity in the Banking and Finance Sector," Carnegie Mellon University Software Engineering Institute, Technical Report CMU/SEI-2004-TR-021, 2004; see http://www.sei.cmu.edu/publications/documents/04.reports/ 04tr021.html.
  • 9
    • 34547433274 scopus 로고    scopus 로고
    • ChoicePoint Fraud Case Shows Need for Security Controls
    • February 22, Gartner, Inc, see
    • A. Litan, "ChoicePoint Fraud Case Shows Need for Security Controls," February 22, 2005, ID No. G00126448, Gartner, Inc.; see http://www.gartner.com/resources/126400/126448/ choicepoint_fra.pdf.
    • (2005) ID No. G00126448
    • Litan, A.1
  • 10
    • 34547407434 scopus 로고    scopus 로고
    • D. Yachin, Combating Insider Threats: The Application-Level User Behavior Tracking Approach, IDC White Paper sponsored by Intellinx, 2006; see http://www.intellinx-sw.com/pdf/ IDC_White_Paper_Combating_Insider_Threats.pdf.
    • D. Yachin, "Combating Insider Threats: The Application-Level User Behavior Tracking Approach," IDC White Paper sponsored by Intellinx, 2006; see http://www.intellinx-sw.com/pdf/ IDC_White_Paper_Combating_Insider_Threats.pdf.
  • 11
    • 0021783476 scopus 로고
    • A Development of APL2 Syntax
    • J. A. Brown, "A Development of APL2 Syntax," IBM J. Res. & Dev. 29, No. 1, 37-48 (1985).
    • (1985) IBM J. Res. & Dev , vol.29 , Issue.1 , pp. 37-48
    • Brown, J.A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.