-
1
-
-
84857505501
-
Intelligence analyses and the insider threat
-
Santos Jr, E., Nguyen, H., Yu, F., Kim, K.J., Li, D., Wilkinson, J.T., Olson, A., Russell, J., Clark, B.: Intelligence analyses and the insider threat. IEEE Trans. Syst. Man Cybern. 42(2), 331–347 (2012)
-
(2012)
IEEE Trans. Syst. Man Cybern.
, vol.42
, Issue.2
, pp. 331-347
-
-
Santos, E.1
Nguyen, H.2
Yu, F.3
Kim, K.J.4
Li, D.5
Wilkinson, J.T.6
Olson, A.7
Russell, J.8
Clark, B.9
-
2
-
-
0012282403
-
Computer intrusion: detecting masquerades
-
Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A.F.: Computer intrusion: detecting masquerades. Stat. Sci. 16(1), 58–74 (2001)
-
(2001)
Stat. Sci.
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
-
3
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu, S., Abraham, A., Thomas, J.P.: Feature deduction and ensemble design of intrusion detection systems. Comput. Secur. 24(4), 295–307 (2005)
-
(2005)
Comput. Secur.
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
4
-
-
81855197007
-
An efficient intrusion detection system based on support vector machines and gradually feature removal method
-
Li, Y., Xia, J., Zhang, S., Yan, J., Ai, X., Dai, K.: An efficient intrusion detection system based on support vector machines and gradually feature removal method. Expert Syst. Appl. 39, 424–430 (2012)
-
(2012)
Expert Syst. Appl.
, vol.39
, pp. 424-430
-
-
Li, Y.1
Xia, J.2
Zhang, S.3
Yan, J.4
Ai, X.5
Dai, K.6
-
5
-
-
0003516333
-
Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University of Technology, Tech
-
Axelsson, S.: Intrusion detection systems: a survey and taxonomy. Department of Computer Engineering, Chalmers University of Technology, Tech. Rep. 2000
-
(2000)
Rep
-
-
Axelsson, S.1
-
6
-
-
85067752996
-
-
Snort
-
Snort. http://www.snort.org
-
-
-
-
7
-
-
85067755681
-
-
Tripwire
-
Tripwire. http://www.tripwire.com/
-
-
-
-
8
-
-
85077745984
-
Tcp wrapper: network monitoring, access control, and booby traps
-
Venema, W.: Tcp wrapper: network monitoring, access control, and booby traps. In: Proceedings of the 3rd USENIX UNIX Security Symposium, 14–16, 85–92 September 1992
-
(1992)
Proceedings of the 3rd USENIX UNIX Security Symposium, 14–16
, pp. 85-92
-
-
Venema, W.1
-
9
-
-
84863381941
-
Detecting anomalous insiders in collaborative information systems
-
Chen, Y., Nyemba, S., Malin, B.: Detecting anomalous insiders in collaborative information systems. IEEE Trans. Dependable Secur. Comput. 9(3), 332–344 (2012)
-
(2012)
IEEE Trans. Dependable Secur. Comput.
, vol.9
, Issue.3
, pp. 332-344
-
-
Chen, Y.1
Nyemba, S.2
Malin, B.3
-
11
-
-
80051527078
-
Attack pattern discovery in forensic investigation of network attacks
-
Zhu, Ying: Attack pattern discovery in forensic investigation of network attacks. IEEE J. Sel. Areas Commun. 29(7), 1349–1357 (2011)
-
(2011)
IEEE J. Sel. Areas Commun.
, vol.29
, Issue.7
, pp. 1349-1357
-
-
Zhu, Y.1
-
12
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31, 2435–2463 (1999)
-
(1999)
Comput. Netw.
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
14
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of the SIGCOMM’05, Philadelphia, 21–26 Aug 2005
-
(2005)
Proceedings of the SIGCOMM’05, Philadelphia
, pp. 21-26
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
15
-
-
84991765629
-
Automated worm fingerprinting
-
USENIX: San Fransisco
-
Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI’04). USENIX, San Fransisco, 2004
-
Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI’04)
, pp. 2004
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
16
-
-
33745477389
-
A comparison of system call feature representations for insider threat detection
-
Liu, A., Martin, C., Hetherington, T., Matzner, S.: A comparison of system call feature representations for insider threat detection. In: Proceedings from the 6th Annual IEEE SMC IAW, 340–347 June 2005
-
(2005)
Proceedings from the 6th Annual IEEE SMC IAW
, pp. 340-347
-
-
Liu, A.1
Martin, C.2
Hetherington, T.3
Matzner, S.4
-
17
-
-
33747175399
-
AI lessons learned from experiments in insider threat detection
-
Liu, A., Martin, C., Hetherington, T., Matzner, S.: AI lessons learned from experiments in insider threat detection. In: Proceedings of the AAAI Spring Symposium, 49–55 March 2006
-
(2006)
Proceedings of the AAAI Spring Symposium
, pp. 49-55
-
-
Liu, A.1
Martin, C.2
Hetherington, T.3
Matzner, S.4
-
19
-
-
18844379137
-
Display-only file server: a solution against information theft due to insider attack
-
Yang, Y. Tzi-cker, C.: Display-only file server: a solution against information theft due to insider attack. In: Proceedings of the ACM Workshop on Digital Rights, 31–39 2004
-
(2004)
Proceedings of the ACM Workshop on Digital Rights
, pp. 31-39
-
-
Yang, Y.1
Tzi-cker, C.2
-
20
-
-
21644453410
-
Security policies to mitigate insider threat in the document control domain
-
Suranjan, P., Vidyaraman, S., Shambhu, U.: Security policies to mitigate insider threat in the document control domain. In: Proceedings of the Computer Security Applications Conference, 304–313 2004
-
(2004)
Proceedings of the Computer Security Applications Conference
, pp. 304-313
-
-
Suranjan, P.1
Vidyaraman, S.2
Shambhu, U.3
-
23
-
-
35048892579
-
Semantic analysis for monitoring insider threats
-
Symonenko, S., Liddy, E. D., Yilmazel, O., Del Zoppo, R., Brown, E., Downey, M.: Semantic analysis for monitoring insider threats. In: Proceedings of the 2nd NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson, 492–500 June 2004
-
(2004)
Proceedings of the 2nd NSF/NIJ Symposium on Intelligence and Security Informatics, Tucson
, pp. 492-500
-
-
Symonenko, S.1
Liddy, E.D.2
Yilmazel, O.3
Del Zoppo, R.4
Brown, E.5
Downey, M.6
-
24
-
-
85067767773
-
Terrorism informatics
-
Springer, New York:
-
Yilmazel, O., Symonenko, S., Balasubramanian, N., Liddy, E.D.: Terrorism informatics. Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content. Springer, New York (2008)
-
(2008)
Leveraging One-Class SVM and Semantic Analysis to Detect Anomalous Content
-
-
Yilmazel, O.1
Symonenko, S.2
Balasubramanian, N.3
Liddy, E.D.4
-
25
-
-
84857501902
-
C.P.:Reflections on the insider threat
-
Springer, New York:
-
Pfleeger, C.P.:Reflections on the insider threat. In: Insider Attack and Cyber Security: Beyond the Hacker, pp. 5–16. Springer, New York (2008)
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
, pp. 5-16
-
-
-
27
-
-
33847609906
-
Capturing user intent for information retrieval
-
Nguyen, H., Santos, E. Jr., Zhao, Q., Wang, H.: Capturing user intent for information retrieval. In: Proceedings of the 48th Annual Meeting HFES, New Orleans, 371–375 Sept 2004
-
(2004)
Proceedings of the 48th Annual Meeting HFES, New Orleans
, pp. 371-375
-
-
Nguyen, H.1
Santos, E.2
Zhao, Q.3
Wang, H.4
-
28
-
-
35648995677
-
Impacts of user modeling on personalization of information retrieval: an evaluation with human intelligence analysts
-
Santos, E. Jr., Zhao, Q., Nguyen, H., Wang, H.: Impacts of user modeling on personalization of information retrieval: an evaluation with human intelligence analysts. In: Proceedings of the 4th Workshop on the Evaluation of Adaptive Systems, Conjunction With UM, 27–36 July 2005
-
(2005)
Proceedings of the 4th Workshop on the Evaluation of Adaptive Systems, Conjunction With UM
, pp. 27-36
-
-
Santos, E.1
Zhao, Q.2
Nguyen, H.3
Wang, H.4
-
29
-
-
33847664064
-
Capturing user intent for information. Dissertation, Ph.D
-
Nguyen, H.: Capturing user intent for information. Dissertation, Ph.D., University of Connecticut (2005)
-
(2005)
University of Connecticut
-
-
Nguyen, H.1
-
30
-
-
38149049950
-
Where can an insider attack?
-
Probst, C., Hansen, R.R., Nielson, F.: Where can an insider attack? In: Proceedings of the Workshop Formal Aspects in Security and Trust, 127–142 March 2006
-
(2006)
Proceedings of the Workshop Formal Aspects in Security and Trust
, pp. 127-142
-
-
Probst, C.1
Hansen, R.R.2
Nielson, F.3
-
31
-
-
0036395373
-
A framework for understanding and predicting insider attacks
-
Schultz, E.: A framework for understanding and predicting insider attacks. Comput. Secur. 21(6), 526–531 (2002)
-
(2002)
Comput. Secur.
, vol.21
, Issue.6
, pp. 526-531
-
-
Schultz, E.1
-
32
-
-
84858241555
-
-
Springer, New York:
-
Stolfo, S., Bellovin, S., Hershkop, S., Keromytis, A., Sinclair, S., Smith, S.W.: Insider Attack and Cyber Security: Beyond the Hacker. Springer, New York (2008)
-
(2008)
Insider Attack and Cyber Security: Beyond the Hacker
-
-
Stolfo, S.1
Bellovin, S.2
Hershkop, S.3
Keromytis, A.4
Sinclair, S.5
Smith, S.W.6
-
33
-
-
0010886042
-
A framework for characterization of insider computer misuse
-
Tuglular, T., Spafford, E.: A framework for characterization of insider computer misuse. Unpublished paper, 1997
-
(1997)
Unpublished paper
-
-
Tuglular, T.1
Spafford, E.2
-
34
-
-
0035790754
-
Thomas, R. :Flexible team-based access control using contexts
-
Georgiadis, C., Mavridis, I., Pangalos, G., Thomas, R.:Flexible team-based access control using contexts. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, 21–27 May 2001
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 21-27
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
-
35
-
-
84994391858
-
Role-based access control on the web
-
Park, J., Sandhu, R., Ahn, G.: Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4(1), 37–71 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.1
Sandhu, R.2
Ahn, G.3
-
36
-
-
0002841051
-
Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management
-
Thomas, R., Sandhu, S.: Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. In: Proceedings of the IFIP 11th International Conference on Database Securty, 166–181 Aug 1997
-
(1997)
Proceedings of the IFIP 11th International Conference on Database Securty
, pp. 166-181
-
-
Thomas, R.1
Sandhu, S.2
-
37
-
-
55549122324
-
Situation-based access control: privacy management via modeling of patient data access scenarios
-
Peleg, M., Beimel, D., Dori, D., Denekamp, Y.: Situation-based access control: privacy management via modeling of patient data access scenarios. J. Biomed. Inform. 41(6), 1028–1040 (2008)
-
(2008)
J. Biomed. Inform.
, vol.41
, Issue.6
, pp. 1028-1040
-
-
Peleg, M.1
Beimel, D.2
Dori, D.3
Denekamp, Y.4
-
38
-
-
3042852281
-
Network traffic as a source of evidence: tool strengths, weaknesses, and future needs
-
Casey, E.: Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Elsevier J. Digit. Investig. 1, 28–43 (2004)
-
(2004)
Elsevier J. Digit. Investig.
, vol.1
, pp. 28-43
-
-
Casey, E.1
-
39
-
-
0036870198
-
Network forensics analysis
-
Corey, V.: Network forensics analysis. IEEE Internet Comput. 6(6), 60–66 (2002)
-
(2002)
IEEE Internet Comput.
, vol.6
, Issue.6
, pp. 60-66
-
-
Corey, V.1
-
40
-
-
4243105024
-
The discipline of internet forensics
-
Berghel, H.: The discipline of internet forensics. Commun. ACM 46(8), 15–20 (2003)
-
(2003)
Commun. ACM
, vol.46
, Issue.8
, pp. 15-20
-
-
Berghel, H.1
-
41
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6(3), 151–180 (1998)
-
(1998)
J. Comput. Secur.
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
42
-
-
33745463455
-
Learning classifiers for misuse detection using a bag of system calls representation
-
Kang, D.-K., Fuller, D., Honavar, V.: Learning classifiers for misuse detection using a bag of system calls representation. In: Proceedings from the 6th Annual IEEE SMC IAW, 118–125 June 2005
-
(2005)
Proceedings from the 6th Annual IEEE SMC IAW
, pp. 118-125
-
-
Kang, D.-K.1
Fuller, D.2
Honavar, V.3
-
43
-
-
0029716418
-
A sense of self for Unix processes
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 120–128 May 1996
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy, Oakland
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
44
-
-
38149083999
-
Exploiting execution context for the detection of anomalous system calls
-
Mutz, D., Robertson, W., Vigna, G., Kemmerer, R.: Exploiting execution context for the detection of anomalous system calls. In: Proceedings of the International Symposium on RAID, Gold Coast, 1–20 Sept 2007
-
(2007)
Proceedings of the International Symposium on RAID, Gold Coast
, pp. 1-20
-
-
Mutz, D.1
Robertson, W.2
Vigna, G.3
Kemmerer, R.4
-
45
-
-
38149092413
-
Understanding precision in host based intrusion detection
-
Sharif, M. S., Singh, K., Giffin, J., Lee, W.: Understanding precision in host based intrusion detection. In: Proceedings of the International Symposium on RAID, 21–41 Sept 2007
-
(2007)
Proceedings of the International Symposium on RAID
, pp. 21-41
-
-
Sharif, M.S.1
Singh, K.2
Giffin, J.3
Lee, W.4
-
46
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Netw. 8(3), 26–41 (1994)
-
(1994)
IEEE Netw.
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
47
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: a specification-based approach
-
Ko, C.: Execution monitoring of security-critical programs in distributed systems: a specification-based approach. In: Proceedings of the IEEE Symposium on Security and Privacy, 175–187 April 1997
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 175-187
-
-
Ko, C.1
-
48
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Liao, Y., Vemuri, V.R.: Use of k-nearest neighbor classifier for intrusion detection. J. Comput. Secur. 21(5), 439–448 (2002)
-
(2002)
J. Comput. Secur.
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
49
-
-
34548752457
-
Incremental local outlier detection for data streams
-
Pokrajac, D., Lazarevic, A., Latecki, L.: Incremental local outlier detection for data streams. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 504–515 April 2007
-
(2007)
In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining
, pp. 504-515
-
-
Pokrajac, D.1
Lazarevic, A.2
Latecki, L.3
-
50
-
-
34548580783
-
Neighborhood formation and anomaly detection in bipartite graph
-
Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graph. In Proceedings of the IEEE Fifth International Conference on Data Mining, 418–425 Nov 2005.
-
(2005)
In Proceedings of the IEEE Fifth International Conference on Data Mining
, pp. 418-425
-
-
Sun, J.1
Qu, H.2
Chakrabarti, D.3
Faloutsos, C.4
-
51
-
-
84945281435
-
Enhancing effectiveness of outlier detections for low density patterns
-
Tang, J., Chen, Z., Fu, A., Cheung, D.: Enhancing effectiveness of outlier detections for low density patterns. In: Proceedings of the Sixth Pacific-Asia Conference on Knowledge Discovery and Data Mining, 535–7548 May 2002
-
(2002)
Proceedings of the Sixth Pacific-Asia Conference on Knowledge Discovery and Data Mining
, pp. 535-7548
-
-
Tang, J.1
Chen, Z.2
Fu, A.3
Cheung, D.4
-
52
-
-
85067745621
-
-
Netdetector
-
Netdetector. http://www.niksun.com/product.php?id=4
-
-
-
-
53
-
-
85067778472
-
-
Networkminer
-
Networkminer. http://networkminer.wiki.sourceforge.net/NetworkMiner
-
-
-
-
54
-
-
85067747203
-
-
Netintercept
-
Netintercept. http://sandstorm.net/products/netintercept
-
-
-
-
55
-
-
85067749149
-
-
Wireshark
-
Wireshark. http://www.wireshark.org
-
-
-
-
57
-
-
48749114837
-
Internet attack knowledge discovery via clusters and cliques of attack traces
-
Pouget, F., Dacier, M., Zimmerman, J., Clark, A., Mohay, G.: Internet attack knowledge discovery via clusters and cliques of attack traces. J. Inf. Assur. Secur. 1, 21–32 (2006)
-
(2006)
J. Inf. Assur. Secur.
, vol.1
, pp. 21-32
-
-
Pouget, F.1
Dacier, M.2
Zimmerman, J.3
Clark, A.4
Mohay, G.5
-
58
-
-
48749129421
-
A framework for attack patterns’ discovery in honeynet data
-
Thonnard, O., Dacier, M.: A framework for attack patterns’ discovery in honeynet data. Digit. Investig. 8, S128–S139 (2008)
-
(2008)
Digit. Investig.
, vol.8
, pp. 128-139
-
-
Thonnard, O.1
Dacier, M.2
-
59
-
-
58349122750
-
Knowledge discovery from honeypot data for monitoring malicious attacks
-
Jin, H., de Vel, O., Zhang, K., Liu, N.: Knowledge discovery from honeypot data for monitoring malicious attacks. In: Proceedings 21st Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence, Auckland, 470–481 Dec 2008
-
(2008)
Proceedings 21st Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence, Auckland
, pp. 470-481
-
-
Jin, H.1
de Vel, O.2
Zhang, K.3
Liu, N.4
-
60
-
-
85067766056
-
-
Yegneswaran, V., Barford, P., Paxson, V.: Using honeypots for internet situational awareness. In Fourth ACM SIGCOMM Workshop on Hot Topics in Networking (Hotnets IV), College Park, Nov 2005
-
Yegneswaran, V., Barford, P., Paxson, V.: Using honeypots for internet situational awareness. In Fourth ACM SIGCOMM Workshop on Hot Topics in Networking (Hotnets IV), College Park, Nov 2005
-
-
-
-
61
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Estan, C. Savage, S. Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: Proceeedings of the SIGCOMM’03, Karlsruhe, 25–29 Aug 2003
-
(2003)
Proceeedings of the SIGCOMM’03, Karlsruhe
, pp. 25-29
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
62
-
-
33750346628
-
Blinc: multilevel traffic classification in the dark
-
Karagiannis, T. Papagiannaki, K., Faloutsos, M.: Blinc: multilevel traffic classification in the dark. In: Proceedings of the SIGCOMM’05, Philadelphia, 21–26 Aug 2005
-
(2005)
Proceedings of the SIGCOMM’05, Philadelphia
, pp. 21-26
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
63
-
-
34547427252
-
Semi-automated discovery of application session structure
-
Kannan, J., Jung, J., Paxson, V., Koksal, C.: Semi-automated discovery of application session structure. In: Proceedings of the Sixth ACM SIGCOMM Conference on Internet Measurement (IMC’06), Rio de Janeiro, 119–132 Oct 2006
-
(2006)
Proceedings of the Sixth ACM SIGCOMM Conference on Internet Measurement (IMC’06), Rio de Janeiro
, pp. 119-132
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.4
|