Ec2nd 2005
DOI: 10.1007/1-84628-352-3_24
|View full text |Cite
|
Sign up to set email alerts
|

Masquerade Detection by Using Activity Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 4 publications
0
1
0
Order By: Relevance
“…The proposed intrusion detection model differs from other mentioned works in the following aspects: 1) combination of distributed IDS and clustering, 2) statistical method for detecting masquerading attacks based on user activity patterns [21], 3) distribute the selected and aggregated masquerading information to all the clusters in an optimal way, 4) uses a set of static (manager agent and host intrusion detection agent (HIDA), cluster head manager agent) and mobile agents (distributing mobile agents) to detect masquerading in the cluster based ad-hoc networks. A mobile agent is a program that can migrate from one host to another in a network of heterogeneous computer systems and fulfill a task specified by its owner.…”
Section: Proposed Workmentioning
confidence: 99%
“…The proposed intrusion detection model differs from other mentioned works in the following aspects: 1) combination of distributed IDS and clustering, 2) statistical method for detecting masquerading attacks based on user activity patterns [21], 3) distribute the selected and aggregated masquerading information to all the clusters in an optimal way, 4) uses a set of static (manager agent and host intrusion detection agent (HIDA), cluster head manager agent) and mobile agents (distributing mobile agents) to detect masquerading in the cluster based ad-hoc networks. A mobile agent is a program that can migrate from one host to another in a network of heterogeneous computer systems and fulfill a task specified by its owner.…”
Section: Proposed Workmentioning
confidence: 99%