메뉴 건너뛰기




Volumn 6075 LNCS, Issue , 2010, Pages 207-218

User modelling for exclusion and anomaly detection: A behavioural intrusion detection system

Author keywords

anomaly detection; behavioural IDS; exclusion; user model

Indexed keywords

ACADEMIC ABILITY; ANOMALY DETECTION; EARLY DETECTION; INTRUSION DETECTION SYSTEMS; KEY CHARACTERISTICS; USER EXPERIENCE; USER GROUPS; USER MODELLING; USER MODELS; USER TYPE; WEB PAGE;

EID: 77954581921     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13470-8_20     Document Type: Conference Paper
Times cited : (15)

References (17)
  • 2
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavior model
    • DOI 10.1016/S0140-3664(00)00364-9, PII S0140366400003649
    • Balajinath, B., Raghavan, S.V.: Intrusion detection through learning behavior model. Computer Communications 24(12), 1202-1212 (2001) (Pubitemid 32610612)
    • (2001) Computer Communications , vol.24 , Issue.12 , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 3
    • 12744252161 scopus 로고    scopus 로고
    • Identity verification through dynamic keystroke analysis
    • Bergadano, F., Gunetti, D., Picardi, C.: Identity verification through dynamic keystroke analysis. Intelligent Data Analysis 7(5), 469-496 (2003)
    • (2003) Intelligent Data Analysis , vol.7 , Issue.5 , pp. 469-496
    • Bergadano, F.1    Gunetti, D.2    Picardi, C.3
  • 7
    • 77952384694 scopus 로고    scopus 로고
    • Principled reasoning and practical applications of alert fusion in intrusion detection systems
    • ACM, New York
    • Gu, G., Cardenas, A.A., Lee, K.: Principled reasoning and practical applications of alert fusion in intrusion detection systems. In: Proc. ASIACCS '08, pp. 136-147. ACM, New York (2008)
    • (2008) Proc. ASIACCS '08 , pp. 136-147
    • Gu, G.1    Cardenas, A.A.2    Lee, K.3
  • 8
    • 84957621815 scopus 로고    scopus 로고
    • Intrusion Detection through Behavioral Data
    • Hand, D.J., Kok, J.N., R. Berthold, M. (eds.) IDA 1999. Springer, Heidelberg
    • Gunetti, D., Ruffo, G.: Intrusion Detection through Behavioral Data. In: Hand, D.J., Kok, J.N., R. Berthold, M. (eds.) IDA 1999. LNCS, vol. 1642, pp. 383-394. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1642 , pp. 383-394
    • Gunetti, D.1    Ruffo, G.2
  • 9
    • 70349791914 scopus 로고    scopus 로고
    • Creating User Profiles from a Command- Line Interface: A Statistical Approach
    • Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. Springer, Heidelberg
    • Iglesias, J.A., Ledezma, A., Sanchis, A.: Creating User Profiles From a Command- Line Interface: A Statistical Approach. In: Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. LNCS, vol. 5535, pp. 90-101. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5535 , pp. 90-101
    • Iglesias, J.A.1    Ledezma, A.2    Sanchis, A.3
  • 12
    • 39049118332 scopus 로고    scopus 로고
    • An Autonomic Intrusion Detection System Based on Behavioral Network Engineering
    • IEEE Press, Washington
    • Mazzariello, C., Oliviero, F.: An Autonomic Intrusion Detection System Based on Behavioral Network Engineering. In: Proc. INFOCOM 2006, pp. 1-2. IEEE Press, Washington (2006)
    • (2006) Proc. INFOCOM 2006 , pp. 1-2
    • Mazzariello, C.1    Oliviero, F.2
  • 14
    • 12244298487 scopus 로고    scopus 로고
    • Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
    • ACM, New York
    • Shavlik, J., Shavlik, M.: Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage. In: Proc. 10th ACM SIGKDD, pp. 276-285. ACM, New York (2004)
    • (2004) Proc. 10th ACM SIGKDD , pp. 276-285
    • Shavlik, J.1    Shavlik, M.2
  • 15
    • 0024122965 scopus 로고
    • Haystack: An intrusion detection system
    • IEEE Press, Washington
    • Smaha, S.E.: Haystack: an intrusion detection system. In: 4th ACSAC, pp. 37-44. IEEE Press, Washington (1988)
    • (1988) 4th ACSAC , pp. 37-44
    • Smaha, S.E.1
  • 16
    • 0029531733 scopus 로고
    • The application of neural networks to UNIX computer security
    • IEEE Press, Washington
    • Tan, K.: The application of neural networks to UNIX computer security. In: IEEE International Conference on Neural Networks, Proc., vol. 1, pp. 476-481. IEEE Press, Washington (1995)
    • (1995) IEEE International Conference on Neural Networks, Proc. , vol.1 , pp. 476-481
    • Tan, K.1
  • 17
    • 69949085708 scopus 로고    scopus 로고
    • Automated stress detection using keystroke and linguistic features: An exploratory study
    • Vizer, L.M., Zhou, L., Sears, A.: Automated stress detection using keystroke and linguistic features: An exploratory study. IJHCS 67(10), 870-886 (2009)
    • (2009) IJHCS , vol.67 , Issue.10 , pp. 870-886
    • Vizer, L.M.1    Zhou, L.2    Sears, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.