Mostrar el registro sencillo del ítem

dc.contributor.authorMaestre Vidal, Jorge
dc.contributor.authorSotelo Monge, Marco Antonio
dc.contributor.otherSotelo Monge, Marco Antonio
dc.date.accessioned2020-05-05T16:17:36Z
dc.date.available2020-05-05T16:17:36Z
dc.date.issued2020
dc.identifier.citationMaestre Vidal, J. y Sotelo Monge, M. A. (2020). Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features. Sensors, 20(7). https://doi.org/10.3390/s20072084es_PE
dc.identifier.issn14248220
dc.identifier.urihttps://hdl.handle.net/20.500.12724/10834
dc.descriptionIndexado en Scopuses_PE
dc.description.abstractIn recent years, dynamic user verification has become one of the basic pillars for insider threat detection. From these threats, the research presented in this paper focuses on masquerader attacks, a category of insiders characterized by being intentionally conducted by persons outside the organization that somehow were able to impersonate legitimate users. Consequently, it is assumed that masqueraders are unaware of the protected environment within the targeted organization, so it is expected that they move in a more erratic manner than legitimate users along the compromised systems. This feature makes them susceptible to being discovered by dynamic user verification methods based on user profiling and anomaly-based intrusion detection. However, these approaches are susceptible to evasion through the imitation of the normal legitimate usage of the protected system (mimicry), which is being widely exploited by intruders. In order to contribute to their understanding, as well as anticipating their evolution, the conducted research focuses on the study of mimicry from the standpoint of an uncharted terrain: the masquerade detection based on analyzing locality traits. With this purpose, the problem is widely stated, and a pair of novel obfuscation methods are introduced: locality-based mimicry by action pruning and locality-based mimicry by noise generation. Their modus operandi, effectiveness, and impact are evaluated by a collection of well-known classifiers typically implemented for masquerade detection. The simplicity and effectiveness demonstrated suggest that they entail attack vectors that should be taken into consideration for the proper hardening of real organizations.es_PE
dc.language.isoenges_PE
dc.publisherNLM (Medline)es_PE
dc.relation.ispartofurn:issn:1424-8220
dc.relation.urihttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC7181010/
dc.rightsinfo:eu-repo/semantics/openAccess
dc.rights.urihttps://creativecommons.org/licenses/by-nc-sa/4.0/*
dc.sourceRepositorio Institucional - Ulimaes_PE
dc.sourceUniversidad de Limaes_PE
dc.subjectProtección de datoses_PE
dc.subjectSeguridad informáticaes_PE
dc.subjectComputer securityes_PE
dc.subjectData protectiones_PE
dc.titleObfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Featureses_PE
dc.typeinfo:eu-repo/semantics/article
dc.description.versioninfo:eu-repo/semantics/publishedVersion
dc.type.otherArtículo en Scopuses_PE
ulima.areas.lineasdeinvestigacionProductividad y empleo / Innovación: tecnologías y productoses_PE
dc.identifier.journalSensorses_PE
dc.publisher.countryCHes_PE
dc.description.peer-reviewRevisión por pareses_PE
dc.subject.ocdehttp://purl.org/pe-repo/ocde/ford#2.02.04
dc.identifier.doihttps://doi.org/10.3390/s20072084
ulima.autor.afiliacionFaculty of Engineering and Architecture, Universidad de Limaes_PE
ulima.autor.carreraIngeniería de Sistemases_PE


Ficheros en el ítem

FicherosTamañoFormatoVer

No hay ficheros asociados a este ítem.

Este ítem aparece en la(s) siguiente(s) colección(ones)

Mostrar el registro sencillo del ítem

info:eu-repo/semantics/openAccess
Excepto si se señala otra cosa, la licencia del ítem se describe como info:eu-repo/semantics/openAccess