User profiling for computer security

@article{Pepyne2004UserPF,
  title={User profiling for computer security},
  author={D. L. Pepyne and Jinghua Hu and Weibo Gong},
  journal={Proceedings of the 2004 American Control Conference},
  year={2004},
  volume={2},
  pages={982-987 vol.2}
}
Systems and control theory was largely responsible for realizing the industrial revolution. We believe that systems and control theory also plays a key role in the information revolution underway. In particular, systems and control theory should have much to offer network security. This paper explores the use of queueing theory and logistic regression modeling methods for profiling computer users based on simple temporal aspects of their behavior. The goal is to develop profiles for very… CONTINUE READING
Highly Cited
This paper has 25 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 18 extracted citations

References

Publications referenced by this paper.
Showing 1-10 of 17 references

An Introduction to Logistic Regression

  • J. Whitehead
  • http://personal.ecu.edu/whiteheadj/data/logit/.
Highly Influential
4 Excerpts

Modeling and Simulation for Network Vulnerability Assessment

  • D. Pepyne, W. Gong, Y. Ho
  • presented at the 40th U.S. Army Ops. Research…
  • 2001
1 Excerpt

Enhancing Profiles for Anomaly Detection using Time Regularities

  • Y. Li, N. Wu, X. Wang, S. Jajodia
  • Proc. of the 1 ACM Workshop on Intrusion…
  • 2000
1 Excerpt

Similar Papers

Loading similar papers…