A New Approach for Detection of Insider Attacks

被引:0
作者
Sen, Sevil [1 ]
机构
[1] Hacettepe Univ, Bilgisayar Muhendisligi Bolumu, Ankara, Turkey
来源
2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU) | 2013年
关键词
insider threats; anomaly detection; Naive Bayes classification;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Insider attacks are among the top security threats today. The basic assumption underlying detection of these attacks is that the insider attackers will deviate from the typical behavior of his victims in order to carry out his malicious activities. In this research, we propose a new approach to detect insider attacks based on this assumption as well.
引用
收藏
页数:4
相关论文
共 14 条
[1]  
[Anonymous], 2011, CYBERSECURITY WATCH
[2]  
Ben Salem M, 2008, ADV INFORM SECUR, V39, P69
[3]  
Chen L., 2006, THE SEVENTH INTERNAT
[4]  
Cloud Security Alliance, 2010, TOP THREATS TO CLOUD
[5]  
Greenberg S., 1998, RESEARCH REPORT
[6]  
Jian Zhou, 2008, 2008 IEEE Conference on Soft Computing in Industrial Applications. SMCia/08, P113, DOI 10.1109/SMCIA.2008.5045945
[7]  
Lane Terran, 1997, AAAI WORKSHOP AI APP, P43
[8]  
Latendresse M., 2005, LNCS, V3548, P141
[9]   Masquerade detection using enriched command lines [J].
Maxion, RA .
2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, :5-14
[10]   Masquerade detection using truncated command lines [J].
Maxion, RA ;
Townsend, TN .
INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, :219-228