Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security 2004
DOI: 10.1145/1029208.1029231
|View full text |Cite
|
Sign up to set email alerts
|

Statistical profiling and visualization for detection of malicious insider attacks on computer networks

Abstract: The massive volume of intrusion detection system (IDS) alarms generated on large networks, and the resulting need for laborintensive security analysis of the text-based IDS alarm logs, has recently brought into question the cost-effectiveness of IDSs. In particular, when host-based IDSs are used to monitor an organization's internal networks, the majority of the resulting alarms represent legitimate, automated system administration. Because of the absence of ground truth about known attacks, we propose an unsu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(21 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…With the passage of time, too much information is displayed on the screen in various colors and sizes, and this can distract users, in turn leading to a decrease in detection efficiency Colombe and Stephens (2004); Samak et al (2008).…”
Section: How To Show: Visualization Methodsmentioning
confidence: 99%
“…With the passage of time, too much information is displayed on the screen in various colors and sizes, and this can distract users, in turn leading to a decrease in detection efficiency Colombe and Stephens (2004); Samak et al (2008).…”
Section: How To Show: Visualization Methodsmentioning
confidence: 99%
“…It includes tools that visually detect anomalies and possible attacks through pattern matching [7] or by using machine learning to check for anomalous behavior [1]. Other tools establish acceptable action patterns to easily detect anomalous patterns [17].…”
Section: Background Literaturementioning
confidence: 99%
“…Other tools establish acceptable action patterns to easily detect anomalous patterns [17]. These tools use visualizations like color maps [7] and different types of graphs like attack-pattern trees [1] or bipartite graphs [17].…”
Section: Background Literaturementioning
confidence: 99%
“…KbM is an approach that has been widely used in addressing the problem of intruders [6], [7]. The process of detecting malicious insiders using the KbM is done by comparing activities that are performed by the user against predefined rules of the expected behavior.…”
Section: Related Workmentioning
confidence: 99%