2021
DOI: 10.1109/tdsc.2019.2954507
|View full text |Cite
|
Sign up to set email alerts
|

A Fine-grained Approach for Anomaly Detection in File System Accesses with Enhanced Temporal User Profiles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 49 publications
0
6
0
Order By: Relevance
“…Other aspects of user behavior have been modeled for anomaly detection: [83] model user actions related to file and information access, with the expectation that adversaries (making use of compromised accounts) won't be as directed and efficient in this task. Other characteristics of file system access, like timestamps and file size, were analyzed in [84]. GUI interactions, including keyboard activity and mouse movements were modeled via SVM in [85] and random forest applied to Microsoft Word interactions in [86].…”
Section: Host-based Indicatorsmentioning
confidence: 99%
“…Other aspects of user behavior have been modeled for anomaly detection: [83] model user actions related to file and information access, with the expectation that adversaries (making use of compromised accounts) won't be as directed and efficient in this task. Other characteristics of file system access, like timestamps and file size, were analyzed in [84]. GUI interactions, including keyboard activity and mouse movements were modeled via SVM in [85] and random forest applied to Microsoft Word interactions in [86].…”
Section: Host-based Indicatorsmentioning
confidence: 99%
“…Learning-based Detections. There are many learning-based security solutions (e.g., [38,39,[51][52][53][54][55]), which offer anomaly detection. Unlike above-mentioned works, this paper proposes a totally different learning-based technique to facilitate the proactive auditing.…”
Section: Related Workmentioning
confidence: 99%
“…Learning-Based Detections. There are many learning-based security solutions (e.g., [104,43,45,55,78,46,75]), which offer anomaly detection. Unlike above-mentioned solutions, this work proposes a totally different learning-based technique to facilitate the proactive auditing.…”
Section: Related Workmentioning
confidence: 99%