2017 40th International Conference on Telecommunications and Signal Processing (TSP) 2017
DOI: 10.1109/tsp.2017.8075928
|View full text |Cite
|
Sign up to set email alerts
|

Towards a user network profiling for internal security using top-k rankings similarity measures

Abstract: Parres-Peredo, Álvaro I.; Piza-Dávila, Hugo I.; Cervantes, Francisco A.I. Parres-Peredo; H.I. Piza-Davila and F. Cervantes (2017). Towards a user network profiling for internal security using top-k rankings similarity measures. Abstract-A major goal of current computer network security systems is to protect the network from outside attackers; however, protecting the network from its own users is still an unattended problem. In campus area networks, the risk of having internal attacks is high because of their t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2019
2019

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…In [17], a profiling method is proposed based on building TopK rankings of accessed services from network traffic captured at the host. Each service is represented by the 3-tuple <remote IP address, transport protocol, remote port>.…”
Section: Network User Profiling Using Topk Rankingsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [17], a profiling method is proposed based on building TopK rankings of accessed services from network traffic captured at the host. Each service is represented by the 3-tuple <remote IP address, transport protocol, remote port>.…”
Section: Network User Profiling Using Topk Rankingsmentioning
confidence: 99%
“…The first two phases employ the same algorithms and parameters as those used to build the user profile. The similarity is calculated using the mechanism offered by the profiling system [17], which is based on the average overlap measure [18]. Figure 7 depicts a sequence of S calculated during six hours of capturing real-time traffic of a single user.…”
Section: Unexpected Behavior Identificationmentioning
confidence: 99%