메뉴 건너뛰기




Volumn , Issue , 2010, Pages 81-94

Anomaly detection over user profiles for intrusion detection

Author keywords

Anomaly detection; Behavioural biometrics; Behavioural intrusion detection; User model

Indexed keywords

ANOMALY DETECTION; APPLICATION PERFORMANCE; DETECTION SYSTEM; HOST-BASED; INTRUSION DETECTION SYSTEMS; MULTIPLE CHARACTERISTICS; NETWORK ADMINISTRATOR; NETWORK TRAFFIC; USAGE PATTERNS; USER ACTIVITY; USER BEHAVIOUR; USER MODELS; USER PROFILE;

EID: 84864544159     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (14)

References (35)
  • 4
    • 0035879674 scopus 로고    scopus 로고
    • Intrusion detection through learning behavior model
    • DOI 10.1016/S0140-3664(00)00364-9, PII S0140366400003649
    • Balajinath, B. & Raghavan, S. V. 2001, 'Intrusion detection through learning behaviour model,' Computer Communications, vol. 24, no. 12, pp. 1202-1212. (Pubitemid 32610612)
    • (2001) Computer Communications , vol.24 , Issue.12 , pp. 1202-1212
    • Balajinath, B.1    Raghavan, S.V.2
  • 5
    • 12744252161 scopus 로고    scopus 로고
    • Identity verification through dynamic keystroke analysis
    • Bergadano, F., Gunetti, D. & Picardi, C. 2003, 'Identity verification through dynamic keystroke analysis,' Intelligent Data Analysis, vol. 7, no. 5, pp. 469-496.
    • (2003) Intelligent Data Analysis , vol.7 , Issue.5 , pp. 469-496
    • Bergadano, F.1    Gunetti, D.2    Picardi, C.3
  • 6
    • 0015992112 scopus 로고
    • User behaviour on an interactive computer system
    • Boies, S. J. 1974, 'User Behaviour on an Interactive Computer System,' IBM Systems Journal, vol. 13, no. 1, pp. 2-18.
    • (1974) IBM Systems Journal , vol.13 , Issue.1 , pp. 2-18
    • Boies, S.J.1
  • 7
    • 0142222738 scopus 로고    scopus 로고
    • Detection and classification of intrusions and faults using sequences of system calls
    • Cabrera, J. B. D., Lewis, L. & Mehra, R. K. 2001, 'Detection and classification of intrusions and faults using sequences of system calls,' SIGMOD Rec., vol. 30, no. 4, pp. 25-34.
    • (2001) SIGMOD Rec. , vol.30 , Issue.4 , pp. 25-34
    • Cabrera, J.B.D.1    Lewis, L.2    Mehra, R.K.3
  • 8
    • 0032072005 scopus 로고    scopus 로고
    • Discovering user access patterns on the World Wide Web
    • PII S0950705198000379
    • Cheung, D. W., Kao, B. & Lee, J. 1998, 'Discovering user access patterns on the World Wide Web,' Knowledge-Based Systems, vol. 10, no. 7, pp. 463-470. (Pubitemid 128393685)
    • (1998) Knowledge-Based Systems , vol.10 , Issue.7 , pp. 463-470
    • Cheung, D.W.1    Kao, B.2    Lee, J.3
  • 12
    • 85008024136 scopus 로고    scopus 로고
    • James P. Anderson: An information security pioneer
    • Eugene, S. 2008, 'James P. Anderson: An Information Security Pioneer,' IEEE Security & Privacy, vol. 6, no. 1, pp. 9.
    • (2008) IEEE Security & Privacy , vol.6 , Issue.1 , pp. 9
    • Eugene, S.1
  • 15
  • 20
    • 84949211287 scopus 로고    scopus 로고
    • EXpert-BSM: A host-based intrusion detection solution for sun solaris
    • IEEE Computer Society, New Orleans, Louisiana
    • Lindqvist, U. & Porras, P. A. 2001, 'eXpert-BSM: A Host-based Intrusion Detection Solution for Sun Solaris,' in 17th Annual Computer Security Applications Conference, IEEE Computer Society, New Orleans, Louisiana, pp. 2-40.
    • (2001) 17th Annual Computer Security Applications Conference , pp. 2-40
    • Lindqvist, U.1    Porras, P.A.2
  • 24
    • 77954581921 scopus 로고    scopus 로고
    • User modelling for exclusion and anomaly detection: A behavioural intrusion detection system
    • Springer, Berlin
    • Pannell, G. & Ashman, H. 2010, 'User Modelling for Exclusion and Anomaly Detection: A Behavioural Intrusion Detection System,' in 18th Intl. User Modeling, Adaptation, and Personalization, Springer, Berlin, pp. 207-218.
    • (2010) 18th Intl. User Modeling, Adaptation, and Personalization , pp. 207-218
    • Pannell, G.1    Ashman, H.2
  • 27
    • 60349131555 scopus 로고    scopus 로고
    • A bioinformatics based approach to user authentication via keystroke dynamics
    • Revett, K. 2009, 'A bioinformatics based approach to user authentication via keystroke dynamics,' International Journal of Control, Automation and Systems, vol. 7, no. 1, pp. 7-15.
    • (2009) International Journal of Control, Automation and Systems , vol.7 , Issue.1 , pp. 7-15
    • Revett, K.1
  • 28
    • 12244298487 scopus 로고    scopus 로고
    • Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
    • KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
    • Shavlik, J. & Shavlik, M. 2004, 'Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage,' in Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, Seattle, WA, USA, pp. 276-285. (Pubitemid 40114937)
    • (2004) KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining , pp. 276-285
    • Shavlik, J.1    Shavlik, M.2
  • 32
    • 0031187547 scopus 로고    scopus 로고
    • How people revisit web pages: Emprical findings and implications for the design of history systems
    • Tauscher, L. & Greenberg, S. 1997, 'How people revisit web pages: emprical findings and implications for the design of history systems,' International Journal of Human Computer Studies, vol. 47, no. 1, pp. 97-138.
    • (1997) International Journal of Human Computer Studies , vol.47 , Issue.1 , pp. 97-138
    • Tauscher, L.1    Greenberg, S.2
  • 33
    • 0022129862 scopus 로고
    • Identity verification through keyboard characteristics
    • Umphress, D. & Williams, G. 1985, 'Identity verification through keyboard characteristics,' International Journal of Man Machine Studies, vol. 23, no. 3, pp. 263-273. (Pubitemid 16218123)
    • (1985) International Journal of Man-Machine Studies , vol.23 , Issue.3 , pp. 263-273
    • Umphress, D.1    Williams, G.2
  • 34
    • 69949085708 scopus 로고    scopus 로고
    • Automated stress detection using keystroke and linguistic features: An exploratory study
    • Vizer, L. M., Zhou, L. & Sears, A. 2009, 'Automated stress detection using keystroke and linguistic features: An exploratory study,' International Journal of Human-Computer Studies, vol. 67, no. 10, pp. 870-886.
    • (2009) International Journal of Human-Computer Studies , vol.67 , Issue.10 , pp. 870-886
    • Vizer, L.M.1    Zhou, L.2    Sears, A.3
  • 35
    • 70350234989 scopus 로고    scopus 로고
    • Behavioural biometrics: A survey and classification
    • Yampolskiy, R. V. & Govindaraju, V. 2008, 'Behavioural biometrics: a survey and classification,' Int. J. Biometrics, vol. 1, no. 1, pp. 81-113.
    • (2008) Int. J. Biometrics , vol.1 , Issue.1 , pp. 81-113
    • Yampolskiy, R.V.1    Govindaraju, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.