A study of effectiveness in masquerade detection
A study of effectiveness in masquerade detection
| dc.contributor.author | Bhukya, Wilson Naik | |
| dc.contributor.author | Suresh Kumar, G. | |
| dc.contributor.author | Negi, Atui | |
| dc.date.accessioned | 2022-03-27T05:51:50Z | |
| dc.date.available | 2022-03-27T05:51:50Z | |
| dc.date.issued | 2006-01-01 | |
| dc.description.abstract | Masquerade attacks are attempts by unauthorized users to gain access to confidential data or greater access privileges, while pretending to be legitimate users. Detection of masquerade attacks is of great importance and is a nontrivial task of system security. While several approaches do exist for masquerade detection, the relative effectiveness of approaches still needs considerable improvement. While in the past certain cost formulations have been used to compute the overall performance of masquerade detection methods, but these formulations appeared to be biased. Hence we present a formulation to compute the effectiveness of masquerade detection and also present a highly effective approach to masquerade detection using Hidden Markov Models (HMM). Our experimentation is on the well-known Schonalu dataset (SEA). Experimentation shows our approach to be most effective in the set of known approaches. © 2006 IEEE. | |
| dc.identifier.citation | IEEE Region 10 Annual International Conference, Proceedings/TENCON | |
| dc.identifier.issn | 21593442 | |
| dc.identifier.uri | 10.1109/TENCON.2006.344199 | |
| dc.identifier.uri | http://ieeexplore.ieee.org/document/4142629/ | |
| dc.identifier.uri | https://dspace.uohyd.ac.in/handle/1/8450 | |
| dc.title | A study of effectiveness in masquerade detection | |
| dc.type | Conference Proceeding. Conference Paper | |
| dspace.entity.type |
Files
License bundle
1 - 1 of 1