Die Informatik des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Verwaltung des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Informatik des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Mathematik des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage des Fachbereiches 3 der Universität Bremen Hier geht es zur Homepage der Universität Bremen


INHALT & PFAD:
Startseite Textformat


Für den Fall, dass Ihr Computer das entsprechende Format nicht angezeigen kann, können Sie sich hier das Dokument als unformatierte Textausgabe ansehen.

(Bitte haben Sie dafür Verständnis, dass gewisse Dokumente nicht als Textalternative zur Verfügung stehen.)


Download:
Download Masquerade Detection Based on File System Navigation (application/pdf 184.7 KB)


Textalternate  Masquerade Detection Based on File System Navigation
Fulltext:




Einladung zum Vortrag


21. Juli 2015, 16.00 Uhr c.t.
Universität Bremen | Cartesium Rotunde



Prof. Dr. Raúl Monroy
Tec de Monterrey, Campus Estado de México


Masquerade Detection Based on File System Navigation
Nowadays, computers store critical information, prompting the development of mechanisms aimed to
timely detect any kind of intrusion. Some of such mechanisms, called masquerade detectors, are often
designed to signal an alarm whenever they detect an anomaly in system behaviour. Usually, the profile of
ordinary system behaviour is built out of a history of command execution and do not consider realistic
masquerade scenarios. In this talk, I will briefly introduce a new masquerade dataset, called Windows
Users and Intruder simulations Logs (WUIL), which, unlike other datasets, involves more faithful
masquerade attempts; further, while building WUIL, we have worked under the hypothesis that the way
in which a user navigates her file system structure helps neatly separating a masquerade attack. Thus,
departing from standard practice, we argue that it is not a user action, but the object upon which the
action is carried out what helps distinguishing user participation. We shall argue that a masquerade
detection approach based on file system navigation provides a valuable means for building models for
masquerade detection.
Biografie
Raúl Monroy obtained a PhD in Artificial Intelligence in 1998 from Edinburgh University, under the supervision of
Prof. Alan Bundy. He has been in Computing at Tecnológico de Monterrey (ITESM), Campus Estado de México, since
1985. In 2010, he was promoted to Professor in Computer Science. Since 1998, he is a member of the Mexican
Research System, currently rank 2. Since 2011, he is a fellow of the Mexican Academy of Sciences. Dr. Monroy's
research focuses on the discovery of novel methods for anomaly detection in computer security; the discovery an
application of general search control strategies for uncovering and correcting errors in either a system or its
specification; and robot motion planning. Dr. Monroy has held several research grants from several funding agencies,
including Google (coholder), CONACYT (holder) ­the Mexican research council, BMBF (coholder), DAAD, (co
holder), FRIDA (holder) and CONACyTREDII (coholder).




Dieser Gast wurde von Dieter Hutter eingeladen.
Prof. Dr. Dieter Hutter 21859831


Masquerade Detection Based on File System Navigation
Masquerade Detection Based on File System Navigation


 



zurück  




Seitenanfang  -  Impressum Zuletzt geändert durch: jungmann [b]   14.07.2015 Admin-Login