Sciweavers

16 search results - page 1 / 4
» Masquerade Detection Using Truncated Command Lines
Sort
View
DSN
2002
IEEE
13 years 9 months ago
Masquerade Detection Using Truncated Command Lines
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecti...
Roy A. Maxion, Tahlia N. Townsend
DSN
2003
IEEE
13 years 10 months ago
Masquerade Detection Using Enriched Command Lines
A masquerade attack, in which one user impersonates another, is among the most serious forms of computer abuse, largely because such attacks are often mounted by insiders, and can...
Roy A. Maxion
COMPSEC
2007
171views more  COMPSEC 2007»
13 years 4 months ago
Masquerade detection by boosting decision stumps using UNIX commands
Jian Zhou, Haruhiko Shirai, Isamu Takahashi, Jousu...
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 6 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
PAKDD
2004
ACM
100views Data Mining» more  PAKDD 2004»
13 years 10 months ago
Using Self-Consistent Naive-Bayes to Detect Masquerades
To gain access to account privileges, an intruder masquerades as the proper account user. This paper proposes a new strategy for detecting masquerades in a multiuser system. To det...
Kwong H. Yung