Computer Intrusion: Detecting Masquerades
Top Cited Papers
Open Access
- 1 February 2001
- journal article
- Published by Institute of Mathematical Statistics in Statistical Science
- Vol. 16 (1) , 58-74
- https://doi.org/10.1214/ss/998929476
Abstract
Masqueraders in computer intrusion detection are people who use somebody else’s computer account. We investigate a number of statistical approaches for detecting masqueraders. To evaluate them, we collected UNIX command data from 50 users and then contaminated the data with masqueraders. The experiment was blinded. We show results from six methods, including two approaches from the computer science community.Keywords
This publication has 6 references indexed in Scilit:
- The application of neural networks to UNIX computer securityPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Detecting masquerades in intrusion detection based on unpopular commandsInformation Processing Letters, 2000
- Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection EvaluationPublished by Defense Technical Information Center (DTIC) ,1999
- Estimation and Modelling Repeated Patterns in High Order Markov Chains with the Mixture Transition Distribution ModelJournal of the Royal Statistical Society Series C: Applied Statistics, 1994
- A Model for High-Order Markov ChainsJournal of the Royal Statistical Society Series B: Statistical Methodology, 1985
- A Technique for High-Performance Data CompressionComputer, 1984