Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned

@inproceedings{Salem2011DataCA,
  title={Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned},
  author={Malek Ben Salem and S. Stolfo},
  year={2011}
}
Real-world large-scale data collection poses an important challenge in the security eld. Insider and masquerader attack data col- lection poses even a greater challenge. Very few organizations acknowl- edge such breaches because of liability concerns and potential implica- tions on their market value. This caused the scarcity of real-world data sets that could be used to study insider and masquerader attacks. In this paper, we present the design, technical, and procedural challenges encountered… Expand
Contextual Profiling of Homogeneous User Groups for Masquerade Detection
The complexity of modern computer networks creates a number of information security challenges for organizations. As the use of computer systems increases they become more targeted by criminals. InExpand
Intrusion Detection and Prevention Systems: An Updated Review
TLDR
This paper presents an updated review on IDPSs given the fact that the most recent review found on the subject was done in 2016, and discusses the use ofIDPSs to identify vulnerabilities in various channels through which data is accessed on a network or system and prevention mechanisms applied to mitigate against intrusion. Expand
Data Protection Mechanism To Prevent Data Theft Attacks In Cloud Using Hierarchical Approach
A B S T R A C T Cloud computing makes tall promises when comes to the shifting dynamics of applying computers to retrieve the data as per demand of end users. Merely, it comes up with the concerns asExpand
Cloud Computing: A Paradigm of More Insider Threats
TLDR
In this paper, multiple existing approaches to handle the insider threats in cloud environment have been investigated and analyzed thoroughly and the comparison of these techniques depicts which better approaches in the paradigm of cloud computing exist. Expand
User Profiles and Identifing User Behaviour in the Cloud Computing Environment
TLDR
For the detection of the masquerade attacks in the cloud infrastructure collaborative filtering algorithm based on the cloud model, the calculation of the statistic features of the score values of all operations used by the user at the access point and based of these the similarity between the input data is determined. Expand
A Model of Illegal Access Detection System under Cloud Environment
In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model.Expand
Illegal Access Detection in the Cloud Computing Environment
In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model.Expand
An Efficient Identity Based Authentication Protocol by Using Password
TLDR
This paper presents a simple scheme that strengthens password-based authentication protocols and helps prevent dictionary attacks, replay attacks and man in the middle attacks etc. Expand
Analysis on Windows illegal operations
Graphical interface for Windows is a multitasking operating system, very easy to use and very broad, but Windows always appear "illegal operation" dialog box. "Illegal operation" operation dialog boxExpand

References

SHOWING 1-6 OF 6 REFERENCES
A Survey of Insider Attack Detection Research
TLDR
The challenges of this problem and current approaches and techniques pursued by the research community for insider attack detection are described, and directions for future research are suggested. Expand
Obedience to Authority: An Experimental View
The Dilema of Obedience Obedience is as basic an element in the structure of social life as one can point to. Some system of authority is a requirement of all communal living, and it is only the manExpand
Design and Analysis: A Researcher's Handbook
TLDR
The book does a good job explaining some fundamental computational methods in statistics and econometrics and will serve students well as a reference book for upper-level undergraduate courses or graduate courses in computational statistics, time series analysis, or econometric methods. Expand
CERT. 2010 e-crimes watch survey
  • CERT. 2010 e-crimes watch survey
  • 2010