Proceedings of the Twelfth International Conference on Information and Knowledge Management 2003
DOI: 10.1145/956863.956901
|View full text |Cite
|
Sign up to set email alerts
|

Misuse detection for information retrieval systems

Abstract: We present a novel approach to detect misuse within an information retrieval system by gathering and maintaining knowledge of the behavior of the user rather than anticipating attacks by unknown assailants. Our approach is based on building and maintaining a profile of the behavior of the system user through tracking, or monitoring of user activity within the information retrieval system. Any new activity of the user is compared to the user profile to detect a potential misuse for the authorized user. We propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 24 publications
(1 citation statement)
references
References 10 publications
(8 reference statements)
0
1
0
Order By: Relevance
“…Cathey made use of the bunching calculations with reference to archives, inquiry questions, and significance appraisals in order to understand any irregularity with reference to company's interest [5], [12]. In this method, a collection of records are arranged into groups.…”
Section: Sensors With Virtual Machinesmentioning
confidence: 99%
“…Cathey made use of the bunching calculations with reference to archives, inquiry questions, and significance appraisals in order to understand any irregularity with reference to company's interest [5], [12]. In this method, a collection of records are arranged into groups.…”
Section: Sensors With Virtual Machinesmentioning
confidence: 99%