Proceedings International Conference on Dependable Systems and Networks
DOI: 10.1109/dsn.2002.1028903
|View full text |Cite
|
Sign up to set email alerts
|

Masquerade detection using truncated command lines

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
115
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 157 publications
(115 citation statements)
references
References 6 publications
0
115
0
Order By: Relevance
“…Maxion and Townsend [10] applied a naïve Bayes classifier and provided a detailed investigation of classification errors [11] highlighting why some masquerade victims are more vulnerable or more successful than others. Wang and Stolfo compared the performance of a naïve Bayes classifier and a SVM classifier to detect masqueraders [18].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Maxion and Townsend [10] applied a naïve Bayes classifier and provided a detailed investigation of classification errors [11] highlighting why some masquerade victims are more vulnerable or more successful than others. Wang and Stolfo compared the performance of a naïve Bayes classifier and a SVM classifier to detect masqueraders [18].…”
Section: Related Workmentioning
confidence: 99%
“…[8,15] 26.8 3.7 IPAM [6,15] 41.1 2.7 Naïve Bayes (w. Updating) [10] 61.5 1.3 Naïve Bayes (No Upd.) [10] 66.2 4.6 Semi-Global Alignment [4] 75.8 7.7 Sequence Alignment (w. Upd.)…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Work on masquerade detection (and, more generally, on profiling user behavior for security purposes) has proliferated over the last decade, especially concerning the study of different detection strategies. Some of the proposals include the use of Bayes classifiers and Support Vector Machines [12][13][14][15][16]; information-theoretic approaches [17,18]; hidden Markov models [19]; or sequence-and text-mining [20][21][22][23] schemes, among others. Despite the diversity of principles behind these methods, the reported results show that they all perform similarly in terms of accuracy.…”
Section: Evaluation Frameworkmentioning
confidence: 99%
“…An alternative method, proposed by [15], uses naïve Bayes to estimate the probability that a command c can be issued by user u. This method builds a profile for a user, so-called self, from a set of training data.…”
Section: Related Workmentioning
confidence: 99%