메뉴 건너뛰기




Volumn , Issue , 2009, Pages 73-79

Using identity credential usage logs to detect anomalous service accesses

Author keywords

Identity theft and misuse detection; Online access log monitoring; Risk scoring

Indexed keywords

ANOMALY DETECTION; CATEGORICAL ATTRIBUTES; E-COMMERCE; FRAUD DETECTION SYSTEM; FRAUDULENT ACCESS; IDENTITY THEFT; LOG DATA; MALICIOUS ACTIVITIES; MISUSE DETECTION; MONITORING RISKS; ON-LINE ACCESS; ON-LINE SERVICE; RISK SCORE; SERVICE ACCESS; TIME STAMPS;

EID: 74049105152     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655028.1655044     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 2
    • 70449690094 scopus 로고    scopus 로고
    • Internet Crime Complaint Center
    • Internet Crime Complaint Center, "2008 Internet Crime Report," 2009.
    • (2008) Internet Crime Report
  • 3
    • 74049135832 scopus 로고    scopus 로고
    • BuzzPort, https://buzzport.gatech.edu.
    • BuzzPort
  • 5
    • 18844395404 scopus 로고    scopus 로고
    • A multi-model approach to the detection of web-based attacks
    • Kruegel, C., Vigna, G., Robertson, W. "A multi-model approach to the detection of web-based attacks," in Computer Networks 48(5), 2005.
    • (2005) Computer Networks , vol.48 , Issue.5
    • Kruegel, C.1    Vigna, G.2    Robertson, W.3
  • 9
    • 0004118981 scopus 로고
    • The NIDES Statistical Component Description and Justification,
    • Harold S. Javitz and Alfonso Valdes. "The NIDES Statistical Component Description and Justification," in SRI Technical Report, 1994.
    • (1994) in SRI Technical Report
    • Javitz, H.S.1    Valdes, A.2
  • 13
    • 51849165619 scopus 로고    scopus 로고
    • Towards a User-Centric Identity-Usage Monitoring System,
    • Daisuke Mashima and Mustaque Ahamad. "Towards a User-Centric Identity-Usage Monitoring System, " in Proc. of ICIMP 2008, 2008.
    • (2008) Proc. of ICIMP
    • Mashima, D.1    Ahamad, M.2
  • 18
    • 85076206522 scopus 로고    scopus 로고
    • Effective and Efficient Malware Detection at the End Host
    • Clemens Kolbitsch et al. "Effective and Efficient Malware Detection at the End Host," in Proc. of 18th USENIX Security Symposium, 2009.
    • (2009) Proc. of 18th USENIX Security Symposium
    • Kolbitsch, C.1
  • 19
    • 74049109876 scopus 로고    scopus 로고
    • IP2LOCATION
    • IP2LOCATION, http://www.ip2location.com.
  • 20
    • 74049137641 scopus 로고    scopus 로고
    • American Registry for Internet Numbers
    • American Registry for Internet Numbers, https://www.arin.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.