[go: up one dir, main page]

Amin et al., 2017 - Google Patents

Compromised user credentials detection using temporal features: A prudent based approach

Amin et al., 2017

View PDF
Document ID
5846271170545781844
Author
Amin A
Anwar S
Shah B
Khattak A
Publication year
Publication venue
Proceedings of the 9th International Conference on Computer and Automation Engineering

External Links

Snippet

This study exposes a serious and rapidly growing cyber threat of compromised legitimate user credentials which is very effective for cyber-criminals to gain trusted relationships with the account owners. Such a compromised user's credentials ultimately result in damage …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems

Similar Documents

Publication Publication Date Title
Karim et al. Phishing detection system through hybrid machine learning based on URL
Panda et al. Developing an efficient feature engineering and machine learning model for detecting IoT-botnet cyber attacks
Kanimozhi et al. Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing
Binhammad et al. The role of AI in cyber security: Safeguarding digital identity
US7721336B1 (en) Systems and methods for dynamic detection and prevention of electronic fraud
Zhu et al. Data mining for network intrusion detection: a comparison of alternative methods
Mishra et al. Detection of DDoS vulnerability in cloud computing using the perplexed bayes classifier
Mustafa et al. Multitask learning for security and privacy in IoV (Internet of Vehicles)
Quezada et al. Real-time bot infection detection system using DNS fingerprinting and machine-learning
Tamy et al. An evaluation of machine learning algorithms to detect attacks in SCADA network
Abuali et al. Intrusion detection techniques in social media cloud: Review and future directions
Jamali et al. An intelligent intrusion detection system by using hierarchically structured learning automata
Orizio et al. Towards an explainable approach for insider threat detection: Constraint network learning
Amin et al. A prudent based approach for compromised user credentials detection
Nazir et al. A review on machine learning techniques for network security
Napanda et al. Artificial intelligence techniques for network intrusion detection
Hamadah et al. Cybersecurity becomes smart using artificial intelligent and machine learning approaches: An overview
Patil et al. Learning to detect phishing web pages using lexical and string complexity analysis
Dubey et al. A novel approach to intrusion detection system using rough set theory and incremental SVM
Korkmaz et al. Deep neural network based phishing classification on a high-risk url dataset
Amin et al. Compromised user credentials detection using temporal features: A prudent based approach
Kabanda A bayesian network model for machine learning and cyber security
Vargheese et al. Machine Learning for Enhanced Cyber Security
Kabanda A Bayesian Network Model for a Zimbabwean Cybersecurity System
Enberg Behavior Analytics in Cyber Security