메뉴 건너뛰기




Volumn 72, Issue , 2016, Pages 14-27

User profiling in intrusion detection: A review

Author keywords

Behavioural biometrics; Intrusion detection and prevention systems; Psychometrics; User behaviour; User profiling

Indexed keywords

BEHAVIORAL RESEARCH; BIOMETRICS; MERCURY (METAL);

EID: 84978971732     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2016.06.012     Document Type: Review
Times cited : (104)

References (106)
  • 1
    • 42049084142 scopus 로고    scopus 로고
    • Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace
    • Abbasi, A., Chen, H., Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26:2 (2008), 1–29.
    • (2008) ACM Trans. Inf. Syst. , vol.26 , Issue.2 , pp. 1-29
    • Abbasi, A.1    Chen, H.2
  • 2
    • 84909959436 scopus 로고    scopus 로고
    • A survey of user modelling in social media websites
    • Abdel-Hafez, A., Xu, Y., A survey of user modelling in social media websites. Comput. Inf. Sci., 6(4), 2013.
    • (2013) Comput. Inf. Sci. , vol.6 , Issue.4
    • Abdel-Hafez, A.1    Xu, Y.2
  • 3
    • 84978974017 scopus 로고    scopus 로고
    • Detection of new malicious code using N-grams signatures. In: Proceeding of Second Annual Conference on Privacy, Security and Trust, October:
    • Abou-Assaleh, T., et al., 2004. Detection of new malicious code using N-grams signatures. In: Proceeding of Second Annual Conference on Privacy, Security and Trust, October: pp. 13–15.
    • (2004) , pp. 13-15
    • Abou-Assaleh, T.1
  • 4
    • 84872013214 scopus 로고    scopus 로고
    • Detecting hoaxes, frauds, and deception in writing style online
    • In: Proceedings of the IEEE Symposium on Security and Privicy (Sp) pp. 461–475
    • Afroz, S., Brennan, M., Greenstadt, R., 2012. Detecting hoaxes, frauds, and deception in writing style online. In: Proceedings of the IEEE Symposium on Security and Privicy (Sp) pp. 461–475.
    • (2012)
    • Afroz, S.1    Brennan, M.2    Greenstadt, R.3
  • 5
    • 0031176923 scopus 로고    scopus 로고
    • Biometrics on smart cards: an approach to keyboard behavioral signature
    • Alexandre, T.J., Biometrics on smart cards: an approach to keyboard behavioral signature. Future Gener. Comput. Syst. 13 (1997), 19–26.
    • (1997) Future Gener. Comput. Syst. , vol.13 , pp. 19-26
    • Alexandre, T.J.1
  • 6
    • 0004048154 scopus 로고
    • Computer Security Threat Monitoring and Surveillance
    • James P. Anderson Company Fort Washington, PA
    • Anderson, J.P., Computer Security Threat Monitoring and Surveillance. 1980, James P. Anderson Company, Fort Washington, PA.
    • (1980)
    • Anderson, J.P.1
  • 7
    • 84978953158 scopus 로고    scopus 로고
    • Astroturfing, 〈〉
    • Astroturfing, 〈 https://en.wikipedia.org/wiki/Astroturfing〉.
  • 8
    • 84898070087 scopus 로고    scopus 로고
    • User identification and authentication using multi-modal behavioral biometrics
    • Bailey, K.O., Okolica, J.S., Peterson, G.L., User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43 (2014), 77–89.
    • (2014) Comput. Secur. , vol.43 , pp. 77-89
    • Bailey, K.O.1    Okolica, J.S.2    Peterson, G.L.3
  • 9
    • 78650465720 scopus 로고    scopus 로고
    • Word length n-grams for text re-use detection
    • 2010: p. 687-699
    • Barron-Cedeno, A., et al. Word length n-grams for text re-use detection. Comput. Linguist. Intell. Text Process., 2010, 687–699 2010: p. 687-699.
    • (2010) Comput. Linguist. Intell. Text Process. , pp. 687-699
    • Barron-Cedeno, A.1
  • 10
    • 10644257876 scopus 로고    scopus 로고
    • Modelling and solving the intrusion detection problem in computer networks
    • Beghdad, R., Modelling and solving the intrusion detection problem in computer networks. Comput. Secur. 23:8 (2004), 687–696.
    • (2004) Comput. Secur. , vol.23 , Issue.8 , pp. 687-696
    • Beghdad, R.1
  • 11
    • 12744252161 scopus 로고    scopus 로고
    • Identity verification through dynamic keystroke analysis
    • 7(5): p. 469-496
    • Bergadano, F., Gunetti, D., Picardi, C., Identity verification through dynamic keystroke analysis. Intell. Data Anal 7:5 (2003), 469–496 7(5): p. 469-496.
    • (2003) Intell. Data Anal , vol.7 , Issue.5 , pp. 469-496
    • Bergadano, F.1    Gunetti, D.2    Picardi, C.3
  • 12
    • 84979081141 scopus 로고    scopus 로고
    • Astroturfing: what is it and why does it matter? 〈〉,
    • Bienkov, A., Astroturfing: what is it and why does it matter? 〈 http://www.theguardian.com/commentisfree/2012/feb/08/what-is-astroturfing〉, 2012.
    • (2012)
    • Bienkov, A.1
  • 13
    • 0035665469 scopus 로고    scopus 로고
    • A comparison of Intrusion Detection systems
    • Biermann, E., A comparison of Intrusion Detection systems. Comput. Secur. 20 (2001), 676–683.
    • (2001) Comput. Secur. , vol.20 , pp. 676-683
    • Biermann, E.1
  • 14
    • 78651410113 scopus 로고    scopus 로고
    • An android application sandbox system for suspicious software detection. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software (Malware 2010) (MALWARE'2010), Nancy, France, France.
    • Blasing, T., et al., 2010. An android application sandbox system for suspicious software detection. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software (Malware 2010) (MALWARE'2010), Nancy, France, France.
    • (2010)
    • Blasing, T.1
  • 15
    • 0035037553 scopus 로고    scopus 로고
    • Adaptive Hypermedia
    • User Modeling and User-Adapted Interaction, Vol. 11, no. 1, pp. 87–110.
    • Brusilovsky, P., 2001. Adaptive Hypermedia. User Modeling and User-Adapted Interaction, Vol. 11, no. 1, pp. 87–110.
    • (2001)
    • Brusilovsky, P.1
  • 16
    • 0142222738 scopus 로고    scopus 로고
    • Detection and classification of intrusions and faults using sequences of system calls
    • Cabrera, J.B.D., Lewis, L., Mehra, R.K., Detection and classification of intrusions and faults using sequences of system calls. SIGMOD Rec. 30:4 (2001), 25–34.
    • (2001) SIGMOD Rec. , vol.30 , Issue.4 , pp. 25-34
    • Cabrera, J.B.D.1    Lewis, L.2    Mehra, R.K.3
  • 17
    • 84858698273 scopus 로고    scopus 로고
    • Unsupervised network intrusion detection systems: detecting the unknown without knowledge
    • Casas, P., Mazel, J., Owezarski, P., Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35:7 (2012), 772–783.
    • (2012) Comput. Commun. , vol.35 , Issue.7 , pp. 772-783
    • Casas, P.1    Mazel, J.2    Owezarski, P.3
  • 18
    • 0002636321 scopus 로고
    • N-gram-based text categorization
    • In Proceedings of 3rd Annual Symposium on Document Analysis and Information Retrieval, SDAIR-94
    • Cavnar, W.B., J.M. Trenkle, 1994. N-gram-based text categorization. In Proceedings of 3rd Annual Symposium on Document Analysis and Information Retrieval, SDAIR-94, pp. 161–175.
    • (1994) , pp. 161-175
    • Cavnar, W.B.1    Trenkle, J.M.2
  • 20
    • 84859722266 scopus 로고    scopus 로고
    • Anomaly detection for discrete sequences: a survey
    • Chandola, V.,B.A., Kumar, V., Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng. 24:5 (2012), 823–839.
    • (2012) IEEE Trans. Knowl. Data Eng. , vol.24 , Issue.5 , pp. 823-839
    • Chandola, V.B.A.1    Kumar, V.2
  • 21
    • 19944364877 scopus 로고    scopus 로고
    • Feature deduction and ensemble design of intrusion detection systems
    • Chebrolua, S., Abrahama, A., Thomas, J.P., Feature deduction and ensemble design of intrusion detection systems. Comput Secur 24 (2005), 295–307.
    • (2005) Comput Secur , vol.24 , pp. 295-307
    • Chebrolua, S.1    Abrahama, A.2    Thomas, J.P.3
  • 22
    • 84893309191 scopus 로고    scopus 로고
    • Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13,
    • Chen, C.M., et al., 2013. Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13, pp. 116–120.
    • (2013) , pp. 116-120
    • Chen, C.M.1
  • 23
    • 84893309191 scopus 로고    scopus 로고
    • Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13,
    • Chen, C.M., et al., 2013. Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13, pp. 116–120.
    • (2013) , pp. 116-120
    • Chen, C.M.1
  • 24
    • 23044525410 scopus 로고    scopus 로고
    • Signature-based methods for data streams
    • Cortes, C., Pregibon, D., Signature-based methods for data streams. Data Min. Knowl. Discov. 5 (2001), 167–182.
    • (2001) Data Min. Knowl. Discov. , vol.5 , pp. 167-182
    • Cortes, C.1    Pregibon, D.2
  • 25
    • 80051793908 scopus 로고    scopus 로고
    • Data preprocessing for anomaly based network intrusion detection
    • Davis, J., Clark, A., Data preprocessing for anomaly based network intrusion detection. A Rev. Comput. Secur. 30 (2011), 353–375.
    • (2011) A Rev. Comput. Secur. , vol.30 , pp. 353-375
    • Davis, J.1    Clark, A.2
  • 26
    • 0023294428 scopus 로고
    • An intrusion detection model
    • Denning, D.E., An intrusion detection model. IEEE Trans. Softw. Eng. SE-13:2 (1987), 222–233.
    • (1987) IEEE Trans. Softw. Eng. , vol.SE-13 , Issue.2 , pp. 222-233
    • Denning, D.E.1
  • 27
    • 85008024136 scopus 로고    scopus 로고
    • An information security pioneer
    • Eugene, S., An information security pioneer. IEEE Secur. Priv., 6(1), 2008, 9.
    • (2008) IEEE Secur. Priv. , vol.6 , Issue.1 , pp. 9
    • Eugene, S.1
  • 28
    • 34250689178 scopus 로고    scopus 로고
    • F., Q. and C. J., 2006. Automatic identification of user interest for personalized search. In: Proceedings of the 15th Intnational World Wide Web Conference,
    • F., Q. and C. J., 2006. Automatic identification of user interest for personalized search. In: Proceedings of the 15th Intnational World Wide Web Conference, 2006: pp. 727–736.
    • (2006) , pp. 727-736
  • 29
    • 0029716418 scopus 로고    scopus 로고
    • 1996. A sense of self for Unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press,
    • Forrest, S., et al., 1996. A sense of self for Unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1996: pp. 120–128.
    • (1996) , pp. 120-128
    • Forrest, S.1
  • 30
    • 84973877588 scopus 로고    scopus 로고
    • Statistical Stylometrics and the Marlowe-Shakespeare Authorship Debate
    • Fox, N., Ehmoda, O., Charniak, E., 2012. Statistical Stylometrics and the Marlowe-Shakespeare Authorship Debate.
    • (2012)
    • Fox, N.1    Ehmoda, O.2    Charniak, E.3
  • 31
    • 34247150712 scopus 로고    scopus 로고
    • 2006. Effective identification of source code authors using byte-level information. In: Proceedings of the 28th International Conference on Software engineering, ICSE'06
    • Frantzeskou, G., et al., 2006. Effective identification of source code authors using byte-level information. In: Proceedings of the 28th International Conference on Software engineering, ICSE'06, pp. 893–896.
    • Frantzeskou, G.1
  • 32
    • 36949007362 scopus 로고    scopus 로고
    • Challenging the anomaly detection paradigm: a provocative discussion
    • In: Proceedings of the 2006 Workshop on New Security Paradigms, ACM, Germany,
    • Gates, C. and C. Taylor, 2006. Challenging the anomaly detection paradigm: a provocative discussion. In: Proceedings of the 2006 Workshop on New Security Paradigms, ACM, Germany, pp. 21–29.
    • (2006) , pp. 21-29
    • Gates, C.1    Taylor, C.2
  • 33
    • 0036930259 scopus 로고    scopus 로고
    • 2002. Using data mining to discover singatures in network-based intrusiton detection. Proceedmgs of the First International Conference on Machme Learmng and Cybemeucs, Beqmg, 4–5 November
    • Han, H., X.-l. Lu, and L.-y. Ren, 2002. Using data mining to discover singatures in network-based intrusiton detection. Proceedmgs of the First International Conference on Machme Learmng and Cybemeucs, Beqmg, 4–5 November 2002.
    • (2002)
    • Han, H.1    Lu, X.-l.2    Ren, L.-y.3
  • 34
    • 35648941630 scopus 로고    scopus 로고
    • Bigrams of syntactic labels for authorship discrimination of short texts
    • Hirst, G., Feiguina, O., Bigrams of syntactic labels for authorship discrimination of short texts. Lit. Linguist. Comput. 22:4 (2007), 405–417.
    • (2007) Lit. Linguist. Comput. , vol.22 , Issue.4 , pp. 405-417
    • Hirst, G.1    Feiguina, O.2
  • 35
    • 33750271571 scopus 로고    scopus 로고
    • N-gram feature selection for authorship identification AIMSA 2006, LNCS(LNAI)
    • Houvardas, J., Stamatatos, E., N-gram feature selection for authorship identification AIMSA 2006, LNCS(LNAI)., 4183, 2006, 77–86.
    • (2006) , vol.4183 , pp. 77-86
    • Houvardas, J.1    Stamatatos, E.2
  • 36
    • 84888986410 scopus 로고    scopus 로고
    • Naive Bayes spam filtering using word-position-based attributes
    • In: Proceedings of the Second Conference on Email and Anti-spam, CEAS, Stanford University.
    • Hovold, J., 2005. Naive Bayes spam filtering using word-position-based attributes. In: Proceedings of the Second Conference on Email and Anti-spam, CEAS, Stanford University.
    • (2005)
    • Hovold, J.1
  • 37
    • 84979005330 scopus 로고    scopus 로고
    • http://www.myersbriggs.org/my-mbti-personality-type/mbti-basics/.
  • 38
    • 80955142792 scopus 로고    scopus 로고
    • Masquerade detection using profile hidden Markov models
    • Huang, L., Stamp, M., Masquerade detection using profile hidden Markov models. Comput. Secur. 30:8 (2011), 732–747.
    • (2011) Comput. Secur. , vol.30 , Issue.8 , pp. 732-747
    • Huang, L.1    Stamp, M.2
  • 39
    • 78449239926 scopus 로고    scopus 로고
    • Mining writeprints from anonymous e-mails for forensic investigation
    • Iqbal, F., et al. Mining writeprints from anonymous e-mails for forensic investigation. Digit Investig. 7:1–2 (2010), 56–64.
    • (2010) Digit Investig. , vol.7 , Issue.1-2 , pp. 56-64
    • Iqbal, F.1
  • 40
    • 48749129671 scopus 로고    scopus 로고
    • A novel approach of mining write-prints for authorship attribution in e-mail forensics
    • Iqbal, F., et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit Investig. 5 (2008), S42–S51.
    • (2008) Digit Investig. , vol.5 , pp. S42-S51
    • Iqbal, F.1
  • 41
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: from a survey towards an established taxonomy
    • Jacob, G., Debar, H., Filiol, E., Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4:3 (2008), 251–266.
    • (2008) J. Comput. Virol. , vol.4 , Issue.3 , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 42
    • 71749115294 scopus 로고    scopus 로고
    • A Novel Approach to Design of User Re-Authentication Systems
    • Jagadeesan, H. and M.S. Hsiao, 2009. A Novel Approach to Design of User Re-Authentication Systems.
    • (2009)
    • Jagadeesan, H.1    Hsiao, M.S.2
  • 43
    • 84883794568 scopus 로고    scopus 로고
    • Understanding user behavior in online social networks: a survey
    • Jin, L., et al. Understanding user behavior in online social networks: a survey. IEEE Commun. Mag., 2013, 143–150.
    • (2013) IEEE Commun. Mag. , pp. 143-150
    • Jin, L.1
  • 44
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Jøsang, A., Ismail, R., Boyd, C., A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43:2 (2007), 618–644.
    • (2007) Decis. Support Syst. , vol.43 , Issue.2 , pp. 618-644
    • Jøsang, A.1    Ismail, R.2    Boyd, C.3
  • 45
    • 78049354490 scopus 로고    scopus 로고
    • An insider threat prediction model
    • Kandias, M., et al. An insider threat prediction model. Trust, Priv. Secur. Digit Bus. 6264 (2010), 26–37.
    • (2010) Trust, Priv. Secur. Digit Bus. , vol.6264 , pp. 26-37
    • Kandias, M.1
  • 46
    • 84978991472 scopus 로고    scopus 로고
    • 2003. N-gram-based author profiles for authorship attribution. In: Proceedings of the Pacific Association for Computational Linguistics.
    • Keselj, V., et al., 2003. N-gram-based author profiles for authorship attribution. In: Proceedings of the Pacific Association for Computational Linguistics, pp. 255–264.
    • Keselj, V.1
  • 48
    • 84880119198 scopus 로고    scopus 로고
    • A comprehensive survey on anomaly-based intrusion detection in MANET
    • Kheyri, D., Karami, M., A comprehensive survey on anomaly-based intrusion detection in MANET. Comput. Inf. Sci., 5, 2012, 4.
    • (2012) Comput. Inf. Sci. , vol.5 , pp. 4
    • Kheyri, D.1    Karami, M.2
  • 49
    • 84935000760 scopus 로고    scopus 로고
    • A user authentication scheme using physiological and behavioral biometrics for multitouch devices
    • Koong, C.S., Yang, T.I., Tseng, C.C., A user authentication scheme using physiological and behavioral biometrics for multitouch devices. Sci. World J., 2014, 2014, 781234.
    • (2014) Sci. World J. , vol.2014 , pp. 781234
    • Koong, C.S.1    Yang, T.I.2    Tseng, C.C.3
  • 51
    • 0003027845 scopus 로고    scopus 로고
    • An application of machine learning to anomaly detection
    • In: Proceedings of the 20th National Information Systems Security Conference,
    • Lane, T. and C.E. Brodley, 1997. An application of machine learning to anomaly detection. In: Proceedings of the 20th National Information Systems Security Conference, pp. 366–380.
    • (1997) , pp. 366-380
    • Lane, T.1    Brodley, C.E.2
  • 52
    • 34250174828 scopus 로고    scopus 로고
    • Windows NT User profiling for masquerader detection
    • In: Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. pp. 386–391.
    • Li, L., S. Sui, and C.N. Manikopoulos, 2006. Windows NT User profiling for masquerader detection. In: Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. pp. 386–391.
    • (2006)
    • Li, L.1    Sui, S.2    Manikopoulos, C.N.3
  • 53
    • 84874336594 scopus 로고    scopus 로고
    • Detecting anomalous user behaviors in workflow-driven web applications
    • In: Proceedings of the 31st International Symposium on Reliable Distributed Systems (SRDS 2012)
    • Li, X., Y. Xue, and B. Malin, 2012. Detecting anomalous user behaviors in workflow-driven web applications. In: Proceedings of the 31st International Symposium on Reliable Distributed Systems (SRDS 2012), pp. 1–10.
    • (2012) , pp. 1-10
    • Li, X.1    Xue, Y.2    Malin, B.3
  • 54
    • 33745456200 scopus 로고    scopus 로고
    • 2005. Fileprints: identifying file types by N-gram analysis. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
    • Li, W.-J., et al., 2005. Fileprints: identifying file types by N-gram analysis. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 64–71.
    • Li, W.-J.1
  • 55
    • 84871186619 scopus 로고    scopus 로고
    • Detection of anomalies from user profiles generated from system
    • In: Proceeding AISC'11 Proceedings of the Ninth Australasian Information Security Conference, 116: pp. 23–32.
    • Corney, M., Mohay, G., 2011. Detection of anomalies from user profiles generated from system. In: Proceeding AISC'11 Proceedings of the Ninth Australasian Information Security Conference, 116: pp. 23–32.
    • (2011) , pp. 23-32
    • Corney, M.1    Mohay, G.2
  • 56
    • 84978958809 scopus 로고    scopus 로고
    • 〈〉, April 17,
    • Maor, E., 〈 https://securityintelligence.com/behavioral-profiling-finding-man-wasnt/〉, April 17, 2013.
    • (2013)
    • Maor, E.1
  • 57
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the behaviour of a program using multiple-length N-grams
    • In: Proceedings of the 2000 Workshop on New Security Paradigms, ACM, Ballycotton, County Cork, Ireland, pp. 101–110.
    • Marceau, C., 2000. Characterizing the behaviour of a program using multiple-length N-grams. In: Proceedings of the 2000 Workshop on New Security Paradigms, ACM, Ballycotton, County Cork, Ireland, pp. 101–110.
    • (2000)
    • Marceau, C.1
  • 58
    • 84920152770 scopus 로고    scopus 로고
    • Distributed filesystem forensics: XtreemFS as a case study
    • Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit Investig. 11:4 (2014), 295–313.
    • (2014) Digit Investig. , vol.11 , Issue.4 , pp. 295-313
    • Martini, B.1    Choo, K.-K.R.2
  • 59
    • 84979072645 scopus 로고    scopus 로고
    • Analyzing behaviorial features for email classification. In: Prodeedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005).
    • Martin, S., et al., 2005. Analyzing behaviorial features for email classification. In: Prodeedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005).
    • (2005)
    • Martin, S.1
  • 60
    • 84889882586 scopus 로고    scopus 로고
    • Generating profile-based signatures for online intrusion and failure detection
    • Masri, W., Assi, R.A., El-Ghali, M., Generating profile-based signatures for online intrusion and failure detection. Inf. Softw. Technol. 56:2 (2014), 238–251.
    • (2014) Inf. Softw. Technol. , vol.56 , Issue.2 , pp. 238-251
    • Masri, W.1    Assi, R.A.2    El-Ghali, M.3
  • 61
    • 38549122470 scopus 로고    scopus 로고
    • A hybrid model to detect malicious executables
    • In: Proceedings of the IEEE International Conference on Communication (ICC'07), pp. 1443–1448.
    • Masud, M.M., L. Khan, and B. Thuraisingham, 2007. A hybrid model to detect malicious executables. In: Proceedings of the IEEE International Conference on Communication (ICC'07), pp. 1443–1448.
    • (2007)
    • Masud, M.M.1    Khan, L.2    Thuraisingham, B.3
  • 62
    • 1542378274 scopus 로고    scopus 로고
    • Masquerade detection using enriched command lines
    • In: Proceedings of International Conference on Dependable Systems and Networks, pp. 5–14.
    • Maxion, R.A., 2003. Masquerade detection using enriched command lines. In: Proceedings of International Conference on Dependable Systems and Networks, pp. 5–14.
    • (2003)
    • Maxion, R.A.1
  • 63
    • 39049118332 scopus 로고    scopus 로고
    • An autonomic intrusion detection system based on behavioural network engineering
    • In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006. pp. 1–2.
    • Mazzariello, C. and F. Oliviero, 2006. An autonomic intrusion detection system based on behavioural network engineering. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006. pp. 1–2.
    • (2006)
    • Mazzariello, C.1    Oliviero, F.2
  • 64
    • 84864573221 scopus 로고    scopus 로고
    • User identification via process profiling: extended abstract
    • In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies,
    • McKinney, S. and D.S. Reeves, 2009. User identification via process profiling: extended abstract. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–4.
    • (2009) , pp. 1-4
    • McKinney, S.1    Reeves, D.S.2
  • 65
    • 84861083700 scopus 로고    scopus 로고
    • A user profile modeling using social annotations: a survey. In: Proceedings of the 21st International Conference Companion on World Wide Web, 12 Companion
    • Mezghani, M., et al., 2012. A user profile modeling using social annotations: a survey. In: Proceedings of the 21st International Conference Companion on World Wide Web, WWW'12 Companion, pp. 969–976.
    • (2012) , pp. 969-976
    • Mezghani, M.1
  • 66
    • 84901192690 scopus 로고    scopus 로고
    • A survey of intrusion detection techniques for cyber-physical systems
    • Mitchell, R., Chen, I.-R., A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46:4 (2014), 1–29.
    • (2014) ACM Comput. Surv. , vol.46 , Issue.4 , pp. 1-29
    • Mitchell, R.1    Chen, I.-R.2
  • 67
    • 84900637145 scopus 로고    scopus 로고
    • A survey of intrusion detection in wireless network applications
    • Mitchell, R., Chen, I.-R., A survey of intrusion detection in wireless network applications. Comput. Commun. 42 (2014), 1–23.
    • (2014) Comput. Commun. , vol.42 , pp. 1-23
    • Mitchell, R.1    Chen, I.-R.2
  • 68
    • 80455177941 scopus 로고    scopus 로고
    • Towards cyber defense: research in intrusion detection and intrusion prevention systems
    • Mohammad Faysel, S.H., Towards cyber defense: research in intrusion detection and intrusion prevention systems. Int. J. Comput. Sci. Netw. Secur. 10:7 (2010), 316–325.
    • (2010) Int. J. Comput. Sci. Netw. Secur. , vol.10 , Issue.7 , pp. 316-325
    • Mohammad Faysel, S.H.1
  • 70
    • 79958717547 scopus 로고    scopus 로고
    • Lie to me: Deceit detection via online behavioral learning
    • In: Proceedings of the IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011), pp. 24.
    • Bhaskaran, N., Frank, M., 2011. Lie to me: Deceit detection via online behavioral learning. In: Proceedings of the IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011), pp. 24.
    • (2011)
    • Bhaskaran, N.1    Frank, M.2
  • 71
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
    • Osanaiye, O., Choo, K.-K.R., Dlodloa, M., Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67 (2016), 147–165.
    • (2016) J. Netw. Comput. Appl. , vol.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.-K.R.2    Dlodloa, M.3
  • 72
    • 84969794985 scopus 로고    scopus 로고
    • Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, b, Paper no. 130
    • Osanaiye O., Cai H., Choo K.-K. R., Dehghantanha A., Xu Z., Dlodlo M. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016b, Paper no. 130.
    • (2016)
    • Osanaiye, O.1    Cai, H.2    Choo, K.-K.R.3    Dehghantanha, A.4    Xu, Z.5    Dlodlo, M.6
  • 73
    • 77954581921 scopus 로고    scopus 로고
    • User modelling for exclusion and anomaly detection: a behavioural intrusion detection system
    • In: Proceedings of User Modeling, Adaptation, and Personalization, 6075: pp. 207–218.
    • Pannell, G. and H. Ashman, 2010. User modelling for exclusion and anomaly detection: a behavioural intrusion detection system. In: Proceedings of User Modeling, Adaptation, and Personalization, 6075: pp. 207–218.
    • (2010)
    • Pannell, G.1    Ashman, H.2
  • 74
    • 84864544159 scopus 로고    scopus 로고
    • Anomaly detection over user profiles for intrusion detection
    • In: Proceedings of the 8th Australian Information Security Mangement Conference.
    • Pannell, G. and H. Ashman, 2010. Anomaly detection over user profiles for intrusion detection. In: Proceedings of the 8th Australian Information Security Mangement Conference.
    • (2010)
    • Pannell, G.1    Ashman, H.2
  • 75
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Patcha, A., Park, J.-M., An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51:12 (2007), 3448–3470.
    • (2007) Comput. Netw. , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 76
    • 84964331105 scopus 로고    scopus 로고
    • Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles
    • Peng, J., Choo, K.-K.R., Ashman, H., Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles. J. Netw. Comput. Appl. 70 (2016), 171–182.
    • (2016) J. Netw. Comput. Appl. , vol.70 , pp. 171-182
    • Peng, J.1    Choo, K.-K.R.2    Ashman, H.3
  • 77
  • 78
    • 84978953555 scopus 로고    scopus 로고
    • Plagiarism detection, 〈
    • Plagiarism detection, 〈 https://en.wikipedia.org/wiki/Plagiarism_detection.
  • 80
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • Rahman, N.H.A., Choo, K.-K.R., A survey of information security incident handling in the cloud. Comput. Secur. 49 (2015), 45–69.
    • (2015) Comput. Secur. , vol.49 , pp. 45-69
    • Rahman, N.H.A.1    Choo, K.-K.R.2
  • 81
    • 79955135282 scopus 로고    scopus 로고
    • a. Detecting and tracking the spread of astroturf memes in microblog streams. Proceedings of the 20th International Conference Companion on World Wide Web
    • Ratkiewicz, J., M. Conover, and M. Meiss, 2011a. Detecting and tracking the spread of astroturf memes in microblog streams. Proceedings of the 20th International Conference Companion on World Wide Web, WWW'11; pp. 249–252.
    • (2011) , pp. 249-252
    • Ratkiewicz, J.1    Conover, M.2    Meiss, M.3
  • 82
    • 84978992891 scopus 로고    scopus 로고
    • b. Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media.
    • Ratkiewicz, J., et al., 2001b. Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media.
    • (2001)
    • Ratkiewicz, J.1
  • 83
    • 60349131555 scopus 로고    scopus 로고
    • A bioinformatics based approach to user authentication via keystroke dynamics
    • Revett, K., A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control, Autom Syst 7:1 (2009), 7–15.
    • (2009) Int J Control, Autom Syst , vol.7 , Issue.1 , pp. 7-15
    • Revett, K.1
  • 84
    • 79956028075 scopus 로고    scopus 로고
    • Characterizing kernel malware behavior with kernel data access patterns
    • In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, pp. 207–216.
    • Rhee, J., Z. Lin, and D. Xu, 2011. Characterizing kernel malware behavior with kernel data access patterns. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, pp. 207–216.
    • (2011)
    • Rhee, J.1    Lin, Z.2    Xu, D.3
  • 85
    • 4544353927 scopus 로고    scopus 로고
    • Multiple self-organizing maps for intrusion detection
    • In: Proceedings of the 23rd National Information Systems Security Conference. Baltimore, MD.
    • Rhodes, B., J. Mahaffey, and J. Cannady, 2000. Multiple self-organizing maps for intrusion detection. In: Proceedings of the 23rd National Information Systems Security Conference. Baltimore, MD.
    • (2000)
    • Rhodes, B.1    Mahaffey, J.2    Cannady, J.3
  • 86
    • 84901236733 scopus 로고    scopus 로고
    • A survey on ontologies for human behavior recognition
    • Rodríguez, N.D., et al. A survey on ontologies for human behavior recognition. ACM Comput. Surv. 46:4 (2014), 1–33.
    • (2014) ACM Comput. Surv. , vol.46 , Issue.4 , pp. 1-33
    • Rodríguez, N.D.1
  • 87
    • 84922160391 scopus 로고    scopus 로고
    • Using a Variety of n-Grams for the Detection of Different Kinds of Plagiarism
    • Valencia España
    • Shrestha, P., Solorio, T., Using a Variety of n-Grams for the Detection of Different Kinds of Plagiarism. Notebook for PAN at CLEF 2013, 2013, Valencia, España.
    • (2013) Notebook for PAN at CLEF 2013
    • Shrestha, P.1    Solorio, T.2
  • 88
    • 62549150881 scopus 로고    scopus 로고
    • A survey of modern authorship attribution methods
    • Stamatatos, E., A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60:3 (2009), 538–556.
    • (2009) J. Am. Soc. Inf. Sci. Technol. , vol.60 , Issue.3 , pp. 538-556
    • Stamatatos, E.1
  • 89
    • 84887467907 scopus 로고    scopus 로고
    • Intrinsic plagiarism detection using character n-gram profiles
    • In: Proceedings of the SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 2009), pp. 38–46.
    • Stamatatos, E., 2009. Intrinsic plagiarism detection using character n-gram profiles. In: Proceedings of the SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 2009), pp. 38–46.
    • (2009)
    • Stamatatos, E.1
  • 90
    • 77953759247 scopus 로고    scopus 로고
    • Decision tree classifier for network intrusiondetection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference, 2,
    • Stein, G., et al., 2005. Decision tree classifier for network intrusiondetection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference, 2, pp. 136–141.
    • (2005) , pp. 136-141
    • Stein, G.1
  • 92
    • 60649109609 scopus 로고    scopus 로고
    • On the use of decision trees as behavioral approaches in intrusion detection
    • In: Proceedings of the Seventh International Conference on Machine Learning and Applications, pp. 665–670.
    • Tabia, K. and S. Benferhat, 2008. On the use of decision trees as behavioral approaches in intrusion detection. In: Proceedings of the Seventh International Conference on Machine Learning and Applications, pp. 665–670.
    • (2008)
    • Tabia, K.1    Benferhat, S.2
  • 93
    • 0022129862 scopus 로고
    • Identity verification through keyboard characteristics
    • Umphress, D., Williams, G., Identity verification through keyboard characteristics. Int. J. Man-Mach. Stud. 23:3 (1985), 263–273.
    • (1985) Int. J. Man-Mach. Stud. , vol.23 , Issue.3 , pp. 263-273
    • Umphress, D.1    Williams, G.2
  • 94
    • 77952924818 scopus 로고    scopus 로고
    • Efficient signature based malware detection on mobile devices
    • Venugopala, D., Hu, G., Efficient signature based malware detection on mobile devices. Mob. Inf. Syst. 4 (2008), 33–49.
    • (2008) Mob. Inf. Syst. , vol.4 , pp. 33-49
    • Venugopala, D.1    Hu, G.2
  • 95
    • 69949085708 scopus 로고    scopus 로고
    • Automated stress detection using keystroke and linguistic features: an exploratory study
    • Vizer, L.M., Zhou, L., Sears, A., Automated stress detection using keystroke and linguistic features: an exploratory study. Int. J. Human-Comput. Stud. 67:10 (2009), 870–886.
    • (2009) Int. J. Human-Comput. Stud. , vol.67 , Issue.10 , pp. 870-886
    • Vizer, L.M.1    Zhou, L.2    Sears, A.3
  • 96
    • 84928939574 scopus 로고    scopus 로고
    • A survey on trust and reputation models for web services: single, composite, and communities
    • Wahab, O.A., et al. A survey on trust and reputation models for web services: single, composite, and communities. Decis. Support. Syst. 74 (2015), 121–134.
    • (2015) Decis. Support. Syst. , vol.74 , pp. 121-134
    • Wahab, O.A.1
  • 97
    • 33847219025 scopus 로고    scopus 로고
    • Woodhams, Jessica; Toye, Kirsty. 2007. An empirical test of the assumptions of case linkage and offender profiling with serial commercial robberies Psychology, Public Policy, and Law, 13, (1): pp. 59–85. 〈
    • Woodhams, Jessica; Toye, Kirsty. 2007. An empirical test of the assumptions of case linkage and offender profiling with serial commercial robberies Psychology, Public Policy, and Law, 13, (1): pp. 59–85. 〈 http://dx.doi.org/10.1037/1076-8971.13.1.59.
    • (2007)
  • 98
    • 84889045953 scopus 로고    scopus 로고
    • A close look on n-grams in intrusion detection: anomaly detection vs. classificatio. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security,
    • Wressnegger, C., et al., 2013. A close look on n-grams in intrusion detection: anomaly detection vs. classificatio. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 67–76.
    • (2013) , pp. 67-76
    • Wressnegger, C.1
  • 99
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion detection systems: a review
    • Wu, S.X., Banzhaf, W., The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10:1 (2010), 1–35.
    • (2010) Appl. Soft Comput. , vol.10 , Issue.1 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 100
    • 84978971298 scopus 로고    scopus 로고
    • https://www.private-eye.co.uk.
  • 101
    • 77952331717 scopus 로고    scopus 로고
    • pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In: Proceedings of The ACM Conference on Wireless Network Security (WiSec),
    • Xie, L., et al., 2010. pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In: Proceedings of The ACM Conference on Wireless Network Security (WiSec), pp. 37–48.
    • (2010) , pp. 37-48
    • Xie, L.1
  • 102
    • 70350234989 scopus 로고    scopus 로고
    • Behavioural biometrics: a survey and classification
    • Yampolskiy, R.V., Govindaraju, V., Behavioural biometrics: a survey and classification. Int. J. Biom. 1:1 (2008), 81–113.
    • (2008) Int. J. Biom. , vol.1 , Issue.1 , pp. 81-113
    • Yampolskiy, R.V.1    Govindaraju, V.2
  • 103
    • 77955712298 scopus 로고    scopus 로고
    • Web user behavioral profiling for user identification
    • Yang, Y., Web user behavioral profiling for user identification. Decis. Support. Syst. 49:3 (2010), 261–271.
    • (2010) Decis. Support. Syst. , vol.49 , Issue.3 , pp. 261-271
    • Yang, Y.1
  • 105
    • 75549084907 scopus 로고    scopus 로고
    • Toward user patterns for online security: Observation time and online user identification
    • Yang, Y., Padmanabhan, B., Toward user patterns for online security: Observation time and online user identification. Decis. Support. Syst. 48:4 (2010), 548–558.
    • (2010) Decis. Support. Syst. , vol.48 , Issue.4 , pp. 548-558
    • Yang, Y.1    Padmanabhan, B.2
  • 106
    • 78651413507 scopus 로고    scopus 로고
    • User profiling for intrusion detection using dynamic and static behavioural models
    • In: Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer-Verlag, pp. 494–505.
    • Yeung, D.-Y. and Y. Ding, 2002.User profiling for intrusion detection using dynamic and static behavioural models. In: Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer-Verlag, pp. 494–505.
    • (2002)
    • Yeung, D.-Y.1    Ding, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.