2013 IEEE Security and Privacy Workshops最新文献

筛选
英文 中文
System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models 使用Fisher特征和高斯混合模型的系统级用户行为生物识别
2013 IEEE Security and Privacy Workshops Pub Date : 2013-05-01 DOI: 10.1109/SPW.2013.33
Yingbo Song, M. B. Salem, Shlomo Hershkop, S. Stolfo
{"title":"System Level User Behavior Biometrics using Fisher Features and Gaussian Mixture Models","authors":"Yingbo Song, M. B. Salem, Shlomo Hershkop, S. Stolfo","doi":"10.1109/SPW.2013.33","DOIUrl":"https://doi.org/10.1109/SPW.2013.33","url":null,"abstract":"We propose a machine learning-based method for biometric identification of user behavior, for the purpose of masquerade and insider threat detection. We designed a sensor that captures system-level events such as process creation, registry key changes, and file system actions. These measurements are used to represent a user's unique behavior profile, and are refined through the process of Fisher feature selection to optimize their discriminative significance. Finally, a Gaussian mixture model is trained for each user using these features. We show that this system achieves promising results for user behavior modeling and identification, and surpasses previous works in this area.","PeriodicalId":383569,"journal":{"name":"2013 IEEE Security and Privacy Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122059055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
StegTorrent: A Steganographic Method for the P2P File Sharing Service StegTorrent: P2P文件共享服务的隐写方法
2013 IEEE Security and Privacy Workshops Pub Date : 2013-03-18 DOI: 10.1109/SPW.2013.11
Pawel Kopiczko, W. Mazurczyk, K. Szczypiorski
{"title":"StegTorrent: A Steganographic Method for the P2P File Sharing Service","authors":"Pawel Kopiczko, W. Mazurczyk, K. Szczypiorski","doi":"10.1109/SPW.2013.11","DOIUrl":"https://doi.org/10.1109/SPW.2013.11","url":null,"abstract":"The paper proposes StegTorrent a new network steganographic method for the popular P2P file transfer service-BitTorrent. It is based on modifying the order of data packets in the peer-peer data exchange protocol. Unlike other existing steganographic methods that modify the packets' order it does not require any synchronization. Experimental results acquired from prototype implementation proved that it provides high steganographic bandwidth of up to 270 b/s while introducing little transmission distortion and providing difficult detectability.","PeriodicalId":383569,"journal":{"name":"2013 IEEE Security and Privacy Workshops","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122391124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信