메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Analyzing user behavior using keystroke dynamics to protect cloud from malicious insiders

Author keywords

Cloud; Insider threat; Keystroke dynamics; Security

Indexed keywords

CLOUD COMPUTING; CLOUDS; DIGITAL STORAGE; DYNAMICS; MOBILE SECURITY; SECURITY OF DATA;

EID: 84923247840     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCEM.2014.7015481     Document Type: Conference Paper
Times cited : (11)

References (34)
  • 1
    • 77954051808 scopus 로고    scopus 로고
    • Effectively and securely using the cloud computing paradigm
    • Information Technology Lab
    • Mell, Peter, and Tim Grance. "Effectively and securely using the cloud computing paradigm. " NIST, Information Technology Lab (2009).
    • (2009) NIST
    • Mell, P.1    Grance, T.2
  • 3
    • 78650609369 scopus 로고    scopus 로고
    • Security guidance for critical areas of focus in cloud computing
    • Brunette, Glenn, and Rich Mogull. "Security guidance for critical areas of focus in cloud computing v2. 1. " Cloud Security Alliance (2009): 1-76.
    • (2009) Cloud Security Alliance , vol.1 , pp. 1-76
    • Brunette, G.1    Mogull, R.2
  • 11
    • 24644470542 scopus 로고    scopus 로고
    • The insider threat to information systems and the effectiveness of ISO17799
    • Theoharidou, Marianthi, et al. "The insider threat to information systems and the effectiveness of ISO17799. " Computers & Security 24. 6 (2005): 472-484.
    • (2005) Computers & Security , vol.24 , Issue.6 , pp. 472-484
    • Theoharidou, M.1
  • 12
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • Schultz, E. Eugene. "A framework for understanding and predicting insider attacks. " Computers & Security 21. 6 (2002): 526-531.
    • (2002) Computers & Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 14
    • 78951472753 scopus 로고    scopus 로고
    • Insider threat detection using a graph-based approach
    • Eberle, William, Jeffrey Graves, and Lawrence Holder. "Insider threat detection using a graph-based approach. " Journal of Applied Security Research 6. 1 (2010): 32-81.
    • (2010) Journal of Applied Security Research , vol.6 , Issue.1 , pp. 32-81
    • Eberle, W.1    Graves, J.2    Holder, L.3
  • 16
    • 0034226287 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • Springer-Verlag
    • Debar, Hervé, Marc Dacier, and Andreas Wespi. "A revised taxonomy for intrusion-detection systems. " Annales des télécommunications. Vol. 55. No. 7-8. Springer-Verlag, 2000.
    • (2000) Annales des Télécommunications. , vol.55 , Issue.7-8
    • Debar, H.1    Dacier, M.2    Wespi, A.3
  • 17
    • 84946410215 scopus 로고    scopus 로고
    • Detecting insider threats by monitoring system call activity
    • Nguyen, Nam T., Peter L. Reiher, and Geoffrey H. Kuenning. "Detecting Insider Threats by Monitoring System Call Activity. " IAW. 2003.
    • (2003) IAW.
    • Nguyen, N.T.1    Reiher, P.L.2    Kuenning, G.H.3
  • 19
    • 0036173202 scopus 로고    scopus 로고
    • Insider threat prediction tool: Evaluating the probability of IT misuse
    • Magklaras, G. B., and S. M. Furnell. "Insider threat prediction tool: Evaluating the probability of IT misuse. " Computers & Security 21. 1 (2001): 62-73.
    • (2001) Computers & Security , vol.21 , Issue.1 , pp. 62-73
    • Magklaras, G.B.1    Furnell, S.M.2
  • 20
    • 24344460927 scopus 로고    scopus 로고
    • A preliminary model of end user sophistication for insider threat prediction in IT systems
    • Magklaras, G. B., and S. M. Furnell. "A preliminary model of end user sophistication for insider threat prediction in IT systems. " Computers & Security 24. 5 (2005): 371-380.
    • (2005) Computers & Security , vol.24 , Issue.5 , pp. 371-380
    • Magklaras, G.B.1    Furnell, S.M.2
  • 21
    • 78049354490 scopus 로고    scopus 로고
    • An insider threat prediction model
    • Springer Berlin Heidelberg
    • Kandias, Miltiadis, et al. "An insider threat prediction model. " Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg, 2010. 26-37.
    • (2010) Trust, Privacy and Security in Digital Business , pp. 26-37
    • Kandias, M.1
  • 24
    • 84861821993 scopus 로고    scopus 로고
    • User authentication via keystroke dynamics based on difference subspace and slope correlation degree
    • Wang, Xuan, Fangxia Guo, and Jian-feng Ma. "User authentication via keystroke dynamics based on difference subspace and slope correlation degree. " Digital Signal Processing 22. 5 (2012): 707-712.
    • Digital Signal Processing 22. 5 (2012): 707-712
    • Wang, X.1    Guo, F.2    Ma, J.3
  • 26
    • 34249913467 scopus 로고    scopus 로고
    • Retraining a keystroke dynamics-based authenticator with impostor patterns
    • Lee, Hyoung-joo, and Sungzoon Cho. "Retraining a keystroke dynamics-based authenticator with impostor patterns. " Computers & Security 26. 4 (2007): 300-310.
    • (2007) Computers & Security , vol.26 , Issue.4 , pp. 300-310
    • Lee, H.-J.1    Cho, S.2
  • 27
    • 84860515716 scopus 로고    scopus 로고
    • Continuous keystroke dynamics: A different perspective towards biometric evaluation
    • Bours, Patrick. "Continuous keystroke dynamics: A different perspective towards biometric evaluation. " Information Security Technical Report 17. 1 (2012): 36-43.
    • (2012) Information Security Technical Report , vol.17 , Issue.1 , pp. 36-43
    • Bours, P.1
  • 28
    • 37849044963 scopus 로고    scopus 로고
    • Keystroke dynamics in a general setting
    • Springer Berlin Heidelberg
    • Janakiraman Rajkumar, and Terence Sim. "Keystroke dynamics in a general setting. " Advances in Biometrics. Springer Berlin Heidelberg, 2007. 584-593.
    • (2007) Advances in Biometrics , pp. 584-593
    • Rajkumar, J.1    Sim, T.2
  • 29
    • 84923237785 scopus 로고    scopus 로고
    • http://nlp. stanford. edu/IR-book/html/htmledition/support-vectormachines-the-linearly-separable-case-1. html.
  • 30
    • 25444522689 scopus 로고    scopus 로고
    • Fast kernel classifiers with online and active learning
    • Bordes, Antoine, et al. "Fast kernel classifiers with online and active learning. " The Journal of Machine Learning Research 6 (2005): 1579-1619.
    • (2005) The Journal of Machine Learning Research , vol.6 , pp. 1579-1619
    • Bordes, A.1
  • 32
    • 0000913324 scopus 로고    scopus 로고
    • SVMTorch: Support vector machines for large-scale regression problems
    • Collobert, Ronan, and Samy Bengio. "SVMTorch: Support vector machines for large-scale regression problems. " The Journal of Machine Learning Research 1 (2001): 143-160.
    • (2001) The Journal of Machine Learning Research , vol.1 , pp. 143-160
    • Collobert, R.1    Bengio, S.2
  • 34
    • 84923237784 scopus 로고    scopus 로고
    • http://www. ratatype. com/learn/average-typing-speed/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.