O'Reilly logo

Handbook of Statistics by Venu Govindaraju, C.R. Rao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 14

A User Behavior Monitoring and Profiling Scheme for Masquerade Detection

Ashish Garg1, Shambhu Upadhyaya1 and Kevin Kwiat2,    1Department of Computer Science and Engineering, State University of New York at Buffalo, Buffalo, NY 14260,USA, 2Air Force Research Laboratory, 525 Brooks Rd., Rome, NY 13441,USA, 1ashish@buffalo.edu1shambhu@buffalo.edu2kwiatk@rl.af.mil

Abstract

Masquerading attack refers to conducting malicious activities on a computer system by impersonating another user. Such attacks are difficult to detect with standard intrusion detection sensors when they are carried out by insiders who have the knowledge of the system. One approach to detect masquerading attacks is to build user profiles and monitor for significant changes ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required