Benchmarking insider threat intrusion detection systems

作者: Binbin Ye

DOI:

关键词:

摘要: Benchmarking Insider Threat Intrusion Detection Systems by Binbin Ye Abstract: An intrusion detection system generally detects unwanted manipulations to computer systems. In recent years, this technology has been used protect personal information after it collected an organization. Selecting appropriate IDS is important decision for security administrators, keep authorized employees from abusing their access the exploit sensitive information. To date, little work done create a benchmark small and mid-size organizations measure compare capability of different insider threat IDSs which are based on user profiling. It motivates us enables these IDSs. The produce useful comparisons accuracy overhead two key research implementations future algorithms, behavior.

参考文章(54)
Malek Ben Salem, Shlomo Hershkop, Salvatore J Stolfo, A Survey of Insider Attack Detection Research Insider Attack and Cyber Security. pp. 69- 90 ,(2008) , 10.1007/978-0-387-77322-3_5
Raj Jain, The art of computer systems performance analysis Int. CMG Conference. pp. 1233- 1236 ,(1991)
Jun Qian, Chao Xu, Meilin Shi, Redesign and Implementation of Evaluation Dataset for Intrusion Detection System Lecture Notes in Computer Science. pp. 451- 465 ,(2006) , 10.1007/11766155_32
R. Freedmen, J. Maurer, V. Wolfe, S. Wohlever, M. Milligan, B. Thuraisingham, Benchmarking real-time distributed object management systems for evolvable and adaptable command and control applications international symposium on object component service oriented real time distributed computing. pp. 202- 205 ,(2000) , 10.1109/ISORC.2000.839530
Andreas Geppert, Stella Gatziu, Klaus R. Dittrich, A Designer's Benchmark for Active Database Management Systems: oo7 Meets the BEAST RIDS '95 Proceedings of the Second International Workshop on Rules in Database Systems. pp. 309- 326 ,(1995) , 10.1007/3-540-60365-4_135
Ramakrishnan Srikant, Rakesh Agrawal, Mining sequential patterns: Generalizations and performance improvements Advances in Database Technology — EDBT '96. pp. 1- 17 ,(1996) , 10.1007/BFB0014140
Christian W. Probst, Jeffrey Hunker, Insiders and Insider Threats: An Overview of Definitions and Mitigation Techniques Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. ,vol. 2, pp. 4- 27 ,(2011)
MP Bodlaender, PDV vd Stok, SH Son, None, A transaction-based temporal data model for real-time databases Proceedings of 5th International Workshop on Parallel and Distributed Real-Time Systems and 3rd Workshop on Object-Oriented Real-Time Systems. pp. 149- 158 ,(1997) , 10.1109/WPDRTS.1997.637972
H. Güneş Kayacık, Nur Zincir-Heywood, Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms Intelligence and Security Informatics. pp. 362- 367 ,(2005) , 10.1007/11427995_29
Günter Karjoth, Access control with IBM Tivoli access manager ACM Transactions on Information and System Security. ,vol. 6, pp. 232- 257 ,(2003) , 10.1145/762476.762479