Towards a user network profiling for internal security using top-K rankings similarity measures
dc.contributor.author | Parres-Peredo, Álvaro I. | |
dc.contributor.author | Piza-Dávila, Hugo I. | |
dc.contributor.author | Cervantes, Francisco | |
dc.date.accessioned | 2017-10-16T16:13:40Z | |
dc.date.available | 2017-10-16T16:13:40Z | |
dc.date.issued | 2017-07 | |
dc.description | A major goal of current computer network security systems is to protect the network from outside attackers; however, protecting the network from its own users is still an unattended problem. In campus area networks, the risk of having internal attacks is high because of their topologies and the amount of users. This work proposes a new approach to identify whether a network user is having or not a normal behavior, by analyzing host traffic using top-k ranking similarity measures. The result of this analysis could be an input of intrusion detection systems. The document presents an experiment where real-time traffic of different users in a campus area network is compared to a reference traffic that corresponds to one of them. | es |
dc.identifier.citation | A.I. Parres-Peredo; H.I. Piza-Davila and F. Cervantes (2017). Towards a user network profiling for internal security using top-k rankings similarity measures. In 40th Int. Conf. Telecommunications and Signal Processing (TSP 2017), Barcelona, Spain, pp.16-19. https://rei.iteso.mx/handle/11117/5009 | es |
dc.identifier.isbn | 978-1-5090-3982-1 | |
dc.identifier.uri | http://hdl.handle.net/11117/5009 | |
dc.language.iso | eng | es |
dc.publisher | IEEE | es |
dc.relation.ispartofseries | Int. Conf. Telecommunications and Signal Processing;40th | |
dc.rights.uri | http://quijote.biblio.iteso.mx/licencias/CC-BY-NC-ND-2.5-MX.pdf | es |
dc.subject | Seguridad Informática | es |
dc.subject | Perfil de Usuarios | es |
dc.subject | Redes de Computadoras | es |
dc.subject | Top-K Rankings | es |
dc.subject | Análisis de Trafico de Red | es |
dc.title | Towards a user network profiling for internal security using top-K rankings similarity measures | es |
dc.type | info:eu-repo/semantics/conferencePaper | es |
rei.peerreviewed | Yes | es |
rei.revisor | 40th Int. Conf. Telecommunications and Signal Processing |
Archivos
Bloque original
1 - 1 de 1
Cargando...
- Nombre:
- Network Profiling for Internal Security.pdf
- Tamaño:
- 742.28 KB
- Formato:
- Adobe Portable Document Format
- Descripción: