Towards building a masquerade detection method based on user file system navigation

14Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Given that information is an extremely valuable asset, it is vital to timely detect whether one's computer (session) is being illegally seized by a masquerader. Masquerade detection has been actively studied for more than a decade, especially after the seminal work of Schonlau's group, who suggested that, to profile a user, one should model the history of the commands she would enter into a UNIX session. Schonlau's group have yielded a masquerade dataset, which has been the standard for comparing masquerade detection methods. However, the performance of these methods is not conclusive, and, as a result, research on masquerade detection has resorted to other sources of information for profiling user behaviour. In this paper, we show how to build an accurate user profile by looking into how the user structures her own file system and how she navigates such structure. While preliminary, our results are encouraging and suggest a number of ways in which new methods can be constructed. © 2011 Springer-Verlag.

Cite

CITATION STYLE

APA

Camiña, B., Monroy, R., Trejo, L. A., & Sánchez, E. (2011). Towards building a masquerade detection method based on user file system navigation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7094 LNAI, pp. 174–186). https://doi.org/10.1007/978-3-642-25324-9_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free