Forensic Investigation of Malicious Insider in Critical Networks using Computational Intelligence
Abstract
Keywords
Full Text:
PDFReferences
Ying Zhu: Attack Pattern Discovery in Forensic Investigation of Network Attacks. IEEE Journal on Selected Areas in Communications 29(7): 1349-1357 (2011)
Intelligence Analyses and the Insider Threat.2012. Eugene Santos, Hien Nguyen , Fei Yu, Keum Joo Kim, Deqing Li, John Thomas Wilkinson, Adam Olson, Russell Jacob, Brittany Clark. IEEE Transactions on Systems, Man, and Cybernetics, Part A. 42(2): 331-347.
A. Liu, C. Martin, T. Hetherington, and S. Matzner, ―A comparison of system call feature representations for insider threat detection,‖ inIEEE SMC IAW, 2005, pp. 340–347.
R. M. et al., ―Implementing a generalized tool for network monitoring,‖in Proc. Eleventh Systems Administration Conference (LISA 1997), 1997,San Diego, CA
V. Paxson, ―Bro: a system for detecting network intruders in real-time,‖Computer Networks, no. 31, pp. 2435–2463, 1999.
M. Schonlau, W. DuMouchel, W.-H. Ju, and A. F. Karr, ―Computer intrusion: Detecting masquerades,‖ Stat. Sci., vol. 16, no. 1, pp. 58–74, Feb. 2001
Refbacks
- There are currently no refbacks.