Extracting features for authentication events

作者: Pratyusa K. Manadhata , Mijung Kim , Manish Marwah

DOI:

关键词:

摘要: In some examples, for a given authentication event between plurality of devices in network, system identifies set events, at the devices, that are temporally related to event. The extracts features from events by aggregating data events. provides extracted classifier detects unauthorized

参考文章(41)
Jennifer Yates, Richard Huber, Jie Chu, Yung-Chao Yu, Zihui Ge, Ping Ji, Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses ,(2012)
Rajgopal Vaithiyanathan, Gautam Shroff, Puneet Agarwal, System and method for creating structured event objects ,(2013)
Chehai Wu, Deian Stefan, Danfeng Yao, Systems and method for malware detection ,(2010)
Andreas Wittenstein, Laura Mather, James Lloyd, Matt Frantz, Mike Eynon, System and method for network security including detection of attacks through partner websites ,(2011)
Jordan M. Breckenridge, Wei-Hao Lin, Travis H. K. Green, Robert Kaplow, Gideon S. Mann, Updateable predictive analytical modeling ,(2011)