메뉴 건너뛰기




Volumn , Issue , 2011, Pages 127-136

Identifying compromised users in shared computing infrastructures: A data-driven Bayesian network approach

Author keywords

Bayesian network; correlation; credential stealing; intrusion detection; security

Indexed keywords

AUTHENTICATION PROTOCOLS; COMPUTING INFRASTRUCTURES; CREDENTIAL STEALING; DATA-DRIVEN; FALSE POSITIVE; GROWING DEMAND; HIGH-PERFORMANCE COMPUTING; INCIDENT DATA; KEY CHARACTERISTICS; LEGITIMATE USERS; MONITORING TOOLS; NATIONAL CENTER FOR SUPERCOMPUTING APPLICATIONS; PUBLIC NETWORKS; SECURITY; SECURITY INCIDENT; SECURITY TOOLS; STORAGE CAPABILITY; UNIVERSITY OF ILLINOIS;

EID: 83155160991     PISSN: 10609857     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SRDS.2011.24     Document Type: Conference Paper
Times cited : (22)

References (25)
  • 1
    • 83155166069 scopus 로고    scopus 로고
    • http://www.top500.org - TOP 500 List.
  • 7
    • 84879840092 scopus 로고    scopus 로고
    • http://www.ncsa.illinois.edu/BlueWaters - National Center for Supercomputing Applications, Blue Waters project.
    • Blue Waters Project
  • 11
    • 69549135546 scopus 로고    scopus 로고
    • Internet Banking: Client-Side Attacks and Protection Mechanisms
    • June
    • R. Oppliger, R. Rytz, T. Holderegger, "Internet Banking: Client-Side Attacks and Protection Mechanisms", IEEE Computer Security, 42(6), June 2009.
    • (2009) IEEE Computer Security , vol.42 , Issue.6
    • Oppliger, R.1    Rytz, R.2    Holderegger, T.3
  • 18
    • 16444376120 scopus 로고    scopus 로고
    • Two-factor authentication: Too little, too late
    • B. Schneier, "Two-factor authentication: too little, too late", Communications of the ACM, 48(4), 2005.
    • (2005) Communications of the ACM , vol.48 , Issue.4
    • Schneier, B.1
  • 19
    • 83155166043 scopus 로고    scopus 로고
    • Measuring Network Security Using Bayesian- Network-based Attack Graphs
    • M. Frigault, L. Wang, "Measuring Network Security Using Bayesian- Network-based Attack Graphs", STPSA 2008.
    • STPSA 2008
    • Frigault, M.1    Wang, L.2
  • 20
    • 77950834855 scopus 로고    scopus 로고
    • Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network modeling
    • September
    • G. Modelo-Howard, S. Bagchi, G. Lebanon, "Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network modeling". RAID, September 2008.
    • (2008) RAID
    • Modelo-Howard, G.1    Bagchi, S.2    Lebanon, G.3
  • 23
    • 47849131097 scopus 로고    scopus 로고
    • Intensive use of Bayesian belief networks for the unified, flexible, and adaptable analysis of misuses and anomalies in network intrusion detection and prevention systems
    • P.G. Bringas, "Intensive use of Bayesian belief networks for the unified, flexible, and adaptable analysis of misuses and anomalies in network intrusion detection and prevention systems", in Proc. of the 18th Int.l Conf- on Database and Expert Systems Applications, 2002.
    • Proc. of the 18th Int.l Conf- on Database and Expert Systems Applications, 2002
    • Bringas, P.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.