Publication | Open Access
Computer Intrusion: Detecting Masquerades
378
Citations
15
References
2001
Year
Internet SecurityEngineeringData ScienceComputer Intrusion DetectionInformation SecurityComputer IntrusionThreat DetectionIntrusion Detection SystemIntrusion DetectionNetworked Computer SystemsInformation ForensicsUnix Command DataComputer Science CommunityComputer ScienceBotnet DetectionData SecurityCryptography
Masqueraders are users who exploit others’ computer accounts. The study evaluates statistical methods for detecting masqueraders. The authors collected UNIX command logs from 50 users, introduced masquerader activity, and conducted a blinded evaluation. Results from six detection methods, including two from computer science, are presented.
Masqueraders in computer intrusion detection are people who use somebody else’s computer account. We investigate a number of statistical approaches for detecting masqueraders. To evaluate them, we collected UNIX command data from 50 users and then contaminated the data with masqueraders. The experiment was blinded. We show results from six methods, including two approaches from the computer science community.
| Year | Citations | |
|---|---|---|
Page 1
Page 1