Amin et al., 2017 - Google Patents
Compromised user credentials detection using temporal features: A prudent based approachAmin et al., 2017
View PDF- Document ID
- 5846271170545781844
- Author
- Amin A
- Anwar S
- Shah B
- Khattak A
- Publication year
- Publication venue
- Proceedings of the 9th International Conference on Computer and Automation Engineering
External Links
Snippet
This study exposes a serious and rapidly growing cyber threat of compromised legitimate user credentials which is very effective for cyber-criminals to gain trusted relationships with the account owners. Such a compromised user's credentials ultimately result in damage …
- 230000001010 compromised 0 title abstract description 52
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Karim et al. | Phishing detection system through hybrid machine learning based on URL | |
| Panda et al. | Developing an efficient feature engineering and machine learning model for detecting IoT-botnet cyber attacks | |
| Kanimozhi et al. | Artificial intelligence based network intrusion detection with hyper-parameter optimization tuning on the realistic cyber dataset CSE-CIC-IDS2018 using cloud computing | |
| Binhammad et al. | The role of AI in cyber security: Safeguarding digital identity | |
| US7721336B1 (en) | Systems and methods for dynamic detection and prevention of electronic fraud | |
| Zhu et al. | Data mining for network intrusion detection: a comparison of alternative methods | |
| Mishra et al. | Detection of DDoS vulnerability in cloud computing using the perplexed bayes classifier | |
| Mustafa et al. | Multitask learning for security and privacy in IoV (Internet of Vehicles) | |
| Quezada et al. | Real-time bot infection detection system using DNS fingerprinting and machine-learning | |
| Tamy et al. | An evaluation of machine learning algorithms to detect attacks in SCADA network | |
| Abuali et al. | Intrusion detection techniques in social media cloud: Review and future directions | |
| Jamali et al. | An intelligent intrusion detection system by using hierarchically structured learning automata | |
| Orizio et al. | Towards an explainable approach for insider threat detection: Constraint network learning | |
| Amin et al. | A prudent based approach for compromised user credentials detection | |
| Nazir et al. | A review on machine learning techniques for network security | |
| Napanda et al. | Artificial intelligence techniques for network intrusion detection | |
| Hamadah et al. | Cybersecurity becomes smart using artificial intelligent and machine learning approaches: An overview | |
| Patil et al. | Learning to detect phishing web pages using lexical and string complexity analysis | |
| Dubey et al. | A novel approach to intrusion detection system using rough set theory and incremental SVM | |
| Korkmaz et al. | Deep neural network based phishing classification on a high-risk url dataset | |
| Amin et al. | Compromised user credentials detection using temporal features: A prudent based approach | |
| Kabanda | A bayesian network model for machine learning and cyber security | |
| Vargheese et al. | Machine Learning for Enhanced Cyber Security | |
| Kabanda | A Bayesian Network Model for a Zimbabwean Cybersecurity System | |
| Enberg | Behavior Analytics in Cyber Security |