The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
Proceedings 20th IEEE Symposium on Reliable Distributed Systems
DOI: 10.1109/reldis.2001.969760
|View full text |Cite
|
Sign up to set email alerts
|

An analytical framework for reasoning about intrusions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…In [14,15,16] the authors propose CIDS, a host-based concurrent intrusion detection scheme. The system is based on user work profiling [5].…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [14,15,16] the authors propose CIDS, a host-based concurrent intrusion detection scheme. The system is based on user work profiling [5].…”
Section: Background and Related Workmentioning
confidence: 99%
“…The basic scheme [16] described above is improved upon by the authors in a later work [14]. In particular, the authors adopt the notion of reasonableness check to address One drawback of this work is that the authors do not address the scenario when a user does not deviate in any manner from the SPRINT plan, but still is able to launch an attack.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…While some projects have addressed these dimensions individually, most research appears to be focused on cyber threat and cyber security. When semantics has been utilized, it is applied to describe the role-based access policy of an organization (RAND, 1999;Upadhyaya et al, 2001). In related work, a research project by Raskin et al (2002) aims to use a natural language-based ontology to scan texts for indicators of possible intellectual property leakage.…”
Section: Related Workmentioning
confidence: 99%
“…Probably the most often cited is the statistical approach used in NIDES [1]. More recently, many other approaches have been investigated as reported in [23], [19], [13], [11], [18], [24], and [20], to mention a few. In these approaches, different measures are monitored to model user behavior: frequencies and sequences of Unix shell commands or system calls, temporal parameters of user actions and temporal intervals between them, etc.…”
Section: Masquerader Detectionmentioning
confidence: 99%