메뉴 건너뛰기




Volumn 30, Issue 5, 2011, Pages 297-310

Masquerade mimicry attack detection: A randomised approach

Author keywords

Anomaly detection; Insider threats; Kullback Leibler divergence; Masqueraders; Mimicry attacks

Indexed keywords

COMPUTER SCIENCE; SECURITY OF DATA;

EID: 79960838421     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.05.004     Document Type: Article
Times cited : (22)

References (50)
  • 3
    • 78650397952 scopus 로고    scopus 로고
    • Preliminary results on masquerader detection using compression-based similarity metrics
    • M. Bertacchini, and P.I. Fierens Preliminary results on masquerader detection using compression-based similarity metrics Electron J SADIO 7 1 2007
    • (2007) Electron J SADIO , vol.7 , Issue.1
    • Bertacchini, M.1    Fierens, P.I.2
  • 4
    • 58349121261 scopus 로고    scopus 로고
    • Adversarial pattern classification using multiple classifiers and randomisation. Structutal, syntactic, and statistical pattern recognition
    • B. Biggio, G. Fumera, and F. Roli Adversarial pattern classification using multiple classifiers and randomisation. Structutal, syntactic, and statistical pattern recognition LNCS 5342 2008 500 509
    • (2008) LNCS , vol.5342 , pp. 500-509
    • Biggio, B.1    Fumera, G.2    Roli, F.3
  • 7
    • 78650005480 scopus 로고    scopus 로고
    • The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems
    • Chan-Tin E, Feldman D, Hopper N, and Kim Y, The frog-boiling attack: limitations of anomaly detection for secure network coordinate systems. In: Secure Comm; 2009.
    • (2009) Secure Comm
    • Chan-Tin, E.1    Feldman, D.2    Hopper, N.3    Kim, Y.4
  • 8
    • 35348917347 scopus 로고    scopus 로고
    • Masquerader detection using OCLEP: One-class classification using Legth statistics of emerging patterns
    • Chen L and Dong G, Masquerader detection using OCLEP: one-class classification using Legth statistics of emerging patterns. In: WAIMW; 2006. p. 5.
    • (2006) WAIMW , pp. 5
    • Chen, L.1    Dong, G.2
  • 11
    • 0002248845 scopus 로고
    • An overview of the relationships between mimicry and crypsis
    • J.A. Endler An overview of the relationships between mimicry and crypsis Biol J Linnean Soc 16 1 1981 25 31
    • (1981) Biol J Linnean Soc , vol.16 , Issue.1 , pp. 25-31
    • Endler, J.A.1
  • 12
    • 84942247408 scopus 로고    scopus 로고
    • Stochastic protocol modeling for anomaly-based network intrusion detection
    • Estevez-Tapiador JM, Garcia-Teodoro P and Diaz-Verdejo JE, Stochastic protocol modeling for anomaly-based network intrusion detection. In: IWIA; 2003. pp. 3-12.
    • (2003) IWIA , pp. 3-12
    • Estevez-Tapiador, J.M.1    Garcia-Teodoro, P.2    Diaz-Verdejo, J.E.3
  • 14
    • 47949129926 scopus 로고    scopus 로고
    • MDL compress for intrusion detection: Signature Inference and masquerade attack
    • Evans S, Eiland E, Markham S, Impson J, and Laczo A, MDL compress for intrusion detection: signature Inference and masquerade attack. In: MILCOM; 2007. pp. 1-7.
    • (2007) MILCOM , pp. 1-7
    • Evans, S.1    Eiland, E.2    Markham, S.3    Impson, J.4    Laczo, A.5
  • 15
    • 34547359214 scopus 로고    scopus 로고
    • Evading network anomaly detection systems: Formal reasoning and practical techniques
    • DOI 10.1145/1180405.1180414, 1180414, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Fogla P and Lee W, Evading network anomaly detection systems: formal reasoning and practical techniques. In: CCS; 2006. pp. 59-68. (Pubitemid 47131356)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 59-68
    • Fogla, P.1    Lee, W.2
  • 20
    • 26844533423 scopus 로고    scopus 로고
    • Intrusion detection via analysis and modelling of user commands
    • Data Warehousing and Knowledge Discovery: 7th International Conference, DaWaK 2005. Proceedings
    • M. Gebski, and R.K. Wong Intrusion detection via analysis and modelling of user commands DAWAK, LNCS Vol. 3589 2005 Springer-Verlag 388 397 (Pubitemid 41450419)
    • (2005) Lecture Notes in Computer Science , vol.3589 , pp. 388-397
    • Gebski, M.1    Wong, R.K.2
  • 21
    • 60749134962 scopus 로고    scopus 로고
    • Automated discovery of mimicry attacks
    • Giffin JT, Jha S and Miller BP, Automated discovery of mimicry attacks. In: RAID; 2006.
    • (2006) RAID
    • Giffin, J.T.1    Jha, S.2    Miller, B.P.3
  • 23
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J Comput Security 6 1998 151 180
    • (1998) J Comput Security , vol.6 , pp. 151-180
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 27
    • 48649108270 scopus 로고    scopus 로고
    • Toward realistic and artifact-free insider-threat data
    • Killourhy KS and Maxion RA, Toward realistic and artifact-free insider-threat data. In: ACSAC; 2007. pp. 87-96.
    • (2007) ACSAC , pp. 87-96
    • Killourhy, K.S.1    Maxion, R.A.2
  • 30
    • 26444586639 scopus 로고    scopus 로고
    • Masquerade detection via customized grammars
    • Detection of Instructions and Malware, and Vulnerability Assessment: Second International Conference, DIMVA 2005. Proceedings
    • M. Latendresse Masquerade detection via customized grammars DIMVA 2005, LNCS Vol. 3548 2005 Springer-Verlag 141 159 (Pubitemid 41430271)
    • (2005) Lecture Notes in Computer Science , vol.3548 , pp. 141-159
    • Latendresse, M.1
  • 31
    • 79960841791 scopus 로고    scopus 로고
    • Adversarial learning
    • Lowd D and Meek C, Adversarial learning. In: ACM KDD; 2005.
    • (2005) ACM KDD
    • Lowd, D.1    Meek, C.2
  • 32
    • 0242456801 scopus 로고    scopus 로고
    • Learning nonstationary models of normal network traffic for etecting novel attacks
    • Mahoney M and Chan PK, Learning nonstationary models of normal network traffic for etecting novel attacks. In: Proc. SIGKDD; 2002.
    • (2002) Proc. SIGKDD
    • Mahoney, M.1    Chan, P.K.2
  • 33
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Mahoney M, Network traffic anomaly detection based on packet bytes. In: Proc. ACM SAC; 2003.
    • (2003) Proc. ACM SAC
    • Mahoney, M.1
  • 34
    • 0036931591 scopus 로고    scopus 로고
    • Masquerade detection using truncated command lines
    • Maxion RA and Townsend TN, Masquerade detection using truncated command lines. In: DSN; 2002. pp. 219-228.
    • (2002) DSN , pp. 219-228
    • Maxion, R.A.1    Townsend, T.N.2
  • 35
    • 1542378274 scopus 로고    scopus 로고
    • Masquerade detection using enriched command Lines
    • Maxion RA, Masquerade detection using enriched command Lines. In: DSN; 2003. pp. 5-14.
    • (2003) DSN , pp. 5-14
    • Maxion, R.A.1
  • 40
    • 77955209381 scopus 로고    scopus 로고
    • Outside the closed world: On using machine learning for network intrusion detection
    • Sommer R and Paxson V, Outside the closed world: on using machine learning for network intrusion detection. In: IEEE Symposium on Security and Privacy; 2010.
    • (2010) IEEE Symposium on Security and Privacy
    • Sommer, R.1    Paxson, V.2
  • 42
    • 0012781111 scopus 로고    scopus 로고
    • Undermining an anomaly-based intrusion detection systems using common exploits
    • Tan KMC, Killourhy KS and Maxion RA, Undermining an anomaly-based intrusion detection systems using common exploits. In: RAID;2002.
    • (2002) RAID
    • Tan, K.M.C.1    Killourhy, K.S.2    Maxion, R.A.3
  • 43
    • 79960836143 scopus 로고    scopus 로고
    • Information-theoretic detection of mimicry masquerade attacks
    • Tapiador JE and Clark JA, Information-theoretic detection of mimicry masquerade attacks. In: NSS; 2010. pp. 5-13.
    • (2010) NSS , pp. 5-13
    • Tapiador, J.E.1    Clark, J.A.2
  • 45
    • 0038011184 scopus 로고    scopus 로고
    • Mimicry attacks on host-based Intrusion detection systems
    • Wagner D and Soto P, Mimicry attacks on host-based Intrusion detection systems. In: ACM CCS; 2002.
    • (2002) ACM CCS
    • Wagner, D.1    Soto, P.2
  • 47
    • 30344438592 scopus 로고    scopus 로고
    • Anomalous payload-based network intrusion detection
    • Wang K and Stolfo S, Anomalous payload-based network intrusion detection. In: RAID; 2004.
    • (2004) RAID
    • Wang, K.1    Stolfo, S.2
  • 48
    • 33750351545 scopus 로고    scopus 로고
    • Anomalous payload-based worm detection and signature generation
    • Wang K and Stolfo S, Anomalous payload-based worm detection and signature generation. In: RAID; 2005.
    • (2005) RAID
    • Wang, K.1    Stolfo, S.2
  • 50
    • 48649098207 scopus 로고    scopus 로고
    • Combating good word attacks on statistical spam filters with multiple instance learning
    • Y. Zhou, Z. Jorgensen, and M. Inge Combating good word attacks on statistical spam filters with multiple instance learning IEEE ICTAI 2007 298 305
    • (2007) IEEE ICTAI , pp. 298-305
    • Zhou, Y.1    Jorgensen, Z.2    Inge, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.