Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic

  title={Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic},
  author={Yingbing Yu and James H. Graham},
  journal={2006 IEEE International Conference on Systems, Man and Cybernetics},
One critical threat facing many organizations is the inside attacks from masqueraders, internal users or external intruders who exploit legitimate user identity and perform malicious attacks. Anomaly intrusion detection systems can be deployed to build a user behavior profile from his/her past activities in a computer system and detect masqueraders if a large deviation is observed. In this paper, we use a finite automata based model to construct a normal behavior reference model from the… CONTINUE READING


Publications referenced by this paper.
Showing 1-10 of 11 references

Intrusion Detection

R. Bace
Macmillan Technical Publishing, 2"d Edition, Indiana, 2000. • 2000
View 1 Excerpt

Knowledge representation using linguistic frizzy relations

B. Balajinath, S. V. Raghavan, +9 authors 2000. W.R. Zhang
Ph. D. dissertation, University of South Carolina, Columbia, SC, 1986. 2314 • 1986
View 1 Excerpt

Computer Security Threat Monitoring and Surveillance

J. P. Anderson
Technical Report, James P. Anderson Co., Fort Washington, Pa., 1980. • 1980

Similar Papers

Loading similar papers…