2015
DOI: 10.1007/s00500-015-1669-6
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy approach for intrusion detection based on user’s commands

Abstract: The article concerns the problem of detecting masqueraders in computer systems. A masquerader in a computer system is an intruder who pretends to be a legitimate user in order to gain access to protected resources. The article presents an intrusion detection method based on a fuzzy approach. Two types of user's activity profiles are proposed along with the corresponding data structures. The solution analyzes the activity of the computer user in a relatively short period of time, building a user's profile. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(9 citation statements)
references
References 43 publications
0
9
0
Order By: Relevance
“…The first group of approaches consists of the techniques based on attack graph analysis [17][18][19][20][21][22][23][24][25][26][27][28], hidden Markov model [29][30][31][32][33][34], and fuzzy logic [35][36][37].…”
Section: The Comparative Analysis Of the Approaches To The Attacker'smentioning
confidence: 99%
See 1 more Smart Citation
“…The first group of approaches consists of the techniques based on attack graph analysis [17][18][19][20][21][22][23][24][25][26][27][28], hidden Markov model [29][30][31][32][33][34], and fuzzy logic [35][36][37].…”
Section: The Comparative Analysis Of the Approaches To The Attacker'smentioning
confidence: 99%
“…In [37], the authors solve the problem of constructing profiles of the normal user behaviour based on the analysis of the log events such as keyboard keys' sequences, characteristic data sequences retrieved from pointing device, chosen options, requested network resources, and so on. They apply fuzzy logic to the qualitative attributes of these events to describe a set of fuzzy profiles and identify masqueraded attacks.…”
Section: Attacker Behaviour Pattern Discovery Using Fuzzy Inferencementioning
confidence: 99%
“…Shanmugavadivu et al [9] introduced a network intrusion detection system using fuzzy logic. Kudłacik et al [10] presented an intrusion detection method based on a fuzzy approach. Azad et al [11] introduced an intrusion detection system which is based on the fuzzy min, fuzzy max neural network and the particle swarm optimization.…”
Section: Related Workmentioning
confidence: 99%
“…Kudłacik et al [30] have presented a method for detecting intrusions based on a fuzzy approach. By analyzing the user's activities in a short period of time, they have generated user's fuzzy profiles.…”
Section: Related Workmentioning
confidence: 99%