메뉴 건너뛰기




Volumn , Issue , 2010, Pages 38-44

Masquerade detection in network environments

Author keywords

D.4.6. security and privacy protection; H.1.2. user machine systems; K.6.5. security and protection

Indexed keywords

COMMAND LINE; CONNECTED SYSTEMS; DATA ACCESSIBILITY; H.1.2. USER/MACHINE SYSTEMS; HOST-BASED; LOG ANALYSIS; MASQUERADE ATTACKS; MASQUERADE DETECTION; NETFLOW DATA; NETWORK DATA; NETWORK ENVIRONMENTS; NETWORK EVENTS; NETWORK STATISTICS; SECURITY AND PRIVACY PROTECTION; SECURITY AND PROTECTION; SYSTEM CALLS; USER NETWORKS; USER PROFILE;

EID: 78649236114     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SAINT.2010.66     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 4
    • 0013420742 scopus 로고    scopus 로고
    • 88/333/45, Department of Computer Science, University of Calgary, Alberta, Canada, Tech. Rep.
    • S. Greenberg, "Using unix: Collected traces of 168 users," 88/333/45, Department of Computer Science, University of Calgary, Alberta, Canada, Tech. Rep., 1998.
    • (1998) Using Unix: Collected Traces of 168 Users
    • Greenberg, S.1
  • 5
    • 33845941202 scopus 로고    scopus 로고
    • Hybrid method for detecting masqueraders using session folding and hidden markov models
    • R. Posadas, J. C. Mex-Perera, R. Monroy, and J. A. Nolazco-Flores, "Hybrid method for detecting masqueraders using session folding and hidden markov models," in MICAI, 2006, pp. 622-631.
    • (2006) MICAI , pp. 622-631
    • Posadas, R.1    Mex-Perera, J.C.2    Monroy, R.3    Nolazco-Flores, J.A.4
  • 6
    • 8344223697 scopus 로고    scopus 로고
    • Towards an immunitybased system for detecting masqueraders
    • T. Okamoto, T. Watanabe, and Y. Ishida, "Towards an immunitybased system for detecting masqueraders," in KES, 2003, pp. 488-495.
    • (2003) KES , pp. 488-495
    • Okamoto, T.1    Watanabe, T.2    Ishida, Y.3
  • 7
    • 38049096241 scopus 로고    scopus 로고
    • Framework of an immunity-based anomaly detection system for user behavior
    • T. Okamoto and Y. Ishida, "Framework of an immunity-based anomaly detection system for user behavior," in KES (3), 2007, pp. 821-829.
    • (2007) KES , Issue.3 , pp. 821-829
    • Okamoto, T.1    Ishida, Y.2
  • 8
    • 85166317163 scopus 로고    scopus 로고
    • Approaches to online learning and concept drift for user identificatio in computer security
    • AAAI Press
    • T. Lane and C. E. Brodley, "Approaches to online learning and concept drift for user identificatio in computer security," in In KDD. AAAI Press, 1998, pp. 259-263.
    • (1998) KDD , pp. 259-263
    • Lane, T.1    Brodley, C.E.2
  • 10
    • 41249096616 scopus 로고    scopus 로고
    • Sequence alignment for masquerade detection
    • S. Coull and B. Szymanski, "Sequence alignment for masquerade detection." Comput. Stat. Data Anal., vol. 52, no. 8, pp. 4116-4131, 2008.
    • (2008) Comput. Stat. Data Anal. , vol.52 , Issue.8 , pp. 4116-4131
    • Coull, S.1    Szymanski, B.2
  • 13
    • 17844372755 scopus 로고    scopus 로고
    • Empirical evaluation of svm-based masquerade detection using unix commands
    • H.-S. Kim and S. D. Cha, "Empirical evaluation of svm-based masquerade detection using unix commands," Computers & Security, vol. 24, no. 2, pp. 160-168, 2005.
    • (2005) Computers & Security , vol.24 , Issue.2 , pp. 160-168
    • Kim, H.-S.1    Cha, S.D.2
  • 18
    • 0141430928 scopus 로고    scopus 로고
    • Radius margin bounds for support vector machines with the rbf kernel
    • K.-M. Chung, W.-C. Kao, C.-L. Sun, L.-L. Wang, and C.-J. Lin, "Radius margin bounds for support vector machines with the rbf kernel," Neural Comput., vol. 15, no. 11, pp. 2643-2681, 2003.
    • (2003) Neural Comput. , vol.15 , Issue.11 , pp. 2643-2681
    • Chung, K.-M.1    Kao, W.-C.2    Sun, C.-L.3    Wang, L.-L.4    Lin, C.-J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.