|
[1] Rakesh Agarwal and Ramakrishnan Srikant. Fast algorithms for mining association rules. In Proc. of the 20th VLDB Conference, pages 487–499, 1994. [2] Michael Armbrust, Armando Fox, Rean Griffith, Anthony D . Joseph, Randy Katz, Andy Konwinski, Gun ho Lee, David Patterson, Ariel Rabkin, Ion Stoica, et al. A view of cloud computing. Communications of the ACM, 53(4):50–58, 2010. [3] Joffroy Beauquier and Yong-Jie Hu. Intrusion detection based on distance combination. CESSE07, Venice, Italy, World Acacemy of Sciences, WAS, 2007. [4] Kuan-Ta Chen and Li-Wen Hong. User identification based on game-play activity patterns. In Grenville J. Armitage, editor, NETGAMES, pages 7–12. ACM, 2007. [5] Cloud Security Alliance. Security guidance for critical areas of focus in cloud computing v2.1. https://cloudsecurityalliance.org/wp-content/uploads/2011/ 07/csaguide.v2.1.pdf, December 2009. [6] Cloud Security Alliance. Top threats to cloud computing v1.0. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf, March 2010. [7] Ashish Garg, Ragini Rahalkar, Shambhu Upadhyaya, and Kevin Kwiat. Profiling users in gui based systems for masquerade detection. In Information Assurance Workshop, 2006 IEEE, pages 48–54. IEEE, 2006. [8] Lucantonio Ghionna, Gianluigi Greco, Antonella Guzzo, and Luigi Pontieri. Outlier detection techniques for process mining applications. Foundations of Intelligent Systems, pages 150–159, 2008. [9] Anup K. Ghosh, Aaron Schwartzbard, and Michael Schatz. Learning program behavior profiles for intrusion detection. In Proceedings of the Workshop on Intrusion Detection and Network Monitoring, pages 51–62, Berkeley, CA, April 9–12 1999. USENIX Association. [10] Zeng-You He, Xiao-Fei Xu, and Sheng-Chun Deng. Outlier detection over data streams. In proceeding of the 7th international conference for young computer scientists (ICYCS’03). Citeseer, 2003. [11] Zeng-You He, Xiao-Fei Xu, Jo-Shua Zhe-Xue Huang, and Sheng-Chun Deng. FP-outlier: Frequent pattern based outlier detection. Computer Science and Information Systems/ComSIS, 2(1):103–118, 2005. [12] Lin Huang and Mark Stamp. Masquerade detection using profile hidden markov models. Computers & Security, 30(8):732–747, 2011. [13] Hyperic. Sigar - system information gatherer and reporter. https://support.hyperic.com/display/SIGAR/Home. [14] Joseph Idziorek, Mark Tannian, and Doug Jacobson. Detecting fraudulent use of cloud resources. In Christian Cachin and Thomas Ristenpart, editors, CCSW, pages 61–72. ACM, 2011. [15] Han-Sung Kim and Sung-Deok Cha. Empirical evaluation of svm-based masquerade detection using unix commands. Computers & Security, 24(2):160–168, 2005. [16] Andrew J. Klosterman and Gregory R. Ganger. Secure continuous biometricenhanced authentication. [17] Yuh-Jye Lee, Yi-Ren Yeh, and Yu-Chiang Frank Wang. Anomaly detection via online oversampling principal component analysis. IEEE Trans. Knowl. Data Eng, 25(7):1460–1470, 2013. [18] Ling Li and Constantine N. Manikopoulos. Windows nt one-class masquerade detection. In Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, pages 82–87. IEEE, 2004. [19] Geng Lin, Glenn Dasmalchi, and Jinzy Zhu. Cloud computing and it as a service: opportunities and challenges. In Web Services, 2008. ICWS’08. IEEE International Conference on, pages 5–5. IEEE, 2008. [20] Jie Liu, F. Richard Yu, Chung-Horng Lung, and Helen Tang. Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks. IEEE Transactions on Wireless Communications, 8(2):806–815, 2009. [21] Roy A. Maxion and Tahlia N. Townsend. Masquerade detection using truncated command lines. In Dependable Systems and Networks, 2002. DSN 2002. Proceedings. International Conference on, pages 219–228. IEEE, 2002. [22] Arik Messerman, Tarik Mustafic, Seyit Ahmet Camtepe, and Sahin Albayrak. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In Biometrics (IJCB), 2011 International Joint Conference on, pages 1–8. IEEE, 2011. [23] Fabian Monrose, Michael K. Reiter, and Susanne Wetzel. Password hardening based on keystroke dynamics. International Journal of Information Security, 1(2):69–83, 2002. [24] Koichiro Niinuma, Unsang Park, and Anil K. Jain. Soft biometric traits for continuous user authentication. Information Forensics and Security, IEEE Transactions on, 5(4):771–780, 2010. [25] Jason Nikolai. Detecting unauthorized usage in a cloud using tenant profiles. [26] Mohammad S. Obaidat and Balqies Sadoun. Verification of computer users using keystroke dynamics. Systems, Man, and Cybernetics, Part B: Cybernetics, IEEE Transactions on, 27(2):261–269, 1997. [27] E. Olden. Architecting a cloud-scale identity fabric. IEEE Computer, 44(3):52–59,2011. [28] Hsing-Kuo Pao, Kuan-Ta Chen, and Hong-Chung Chang. Game bot detection via avatar trajectory analysis. IEEE Trans. Comput. Intellig. and AI in Games, 2(3):162–175, 2010. [29] Hsing-Kuo Pao, Junaidillah Fadlil, Hong-Yi Lin, and Kuan-Ta Chen. Trajectory analysis for user verification and recognition. Knowl.-Based Syst, 34:81–90, 2012. [30] Jia-Dong Ren, Qun-Hui Wu, Chang-Zhen Hu, and Kun-Sheng Wang. An approach for analyzing infrequent software faults based on outlier detection. In Artificial Intelligence and Computational Intelligence, 2009. AICI’09. International Conference on, volume 4, pages 302–306. IEEE, 2009. [31] Malek Ben Salem, Shlomo Hershkop, and Salvatore J. Stolfo. A survey of insider attack detection research. In Insider Attack and Cyber Security, pages 69–90. Springer, 2008. [32] Malek Ben Salem and Salvatore Stolfo. Combining a baiting and a user search profiling techniques for masquerade detection. 2011. [33] Vyas Sekar and Petros Maniatis. Verifiable resource accounting for cloud computing services. In Christian Cachin and Thomas Ristenpart, editors, CCSW, pages 21–26. ACM, 2011. [34] Chao Shen, Zhong-Min Cai, and Xiao-Hong Guan. Continuous authentication for mouse dynamics: A pattern-growth approach. In Dependable Systems and Networks (DSN), 2012 42nd Annual IEEE/IFIP International Conference on, pages 1–12. IEEE, 2012. [35] S. J. Shepherd. Continuous authentication by analysis of keyboard typing characteristics. 1995. [36] Boleslaw K. Szymanski and Yongqiang Zhang. Recursive data mining for masquerade detection and author identification. In Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC, pages 424–431. IEEE, 2004. [37] Kleber Vieira, Alexandre Schulter, Carlos Becker Westphall, and Carla Merkle Westphall. Intrusion detection for grid and cloud computing. IT Professional, 12(4):38–43, 2010. [38] Cheng-WeiWang, Vanish Talwar, Karsten Schwan, and Parthasarathy Ranganathan. Online detection of utility cloud anomalies using metric distributions. In NOMS, pages 96–103. IEEE, 2010. [39] Shu Wu and Sheng-Rui Wang. Parameter-free anomaly detection for categorical data. In Petra Perner, editor, MLDM, volume 6871 of Lecture Notes in Computer Science, pages 112–126. Springer, 2011. [40] Yi Xie and Shun-Zheng Yu. Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw, 17(1):15–25, 2009. [41] Wei Xu, Ling Huang, Armando Fox, David A. Patterson, and Michael I. Jordan. Detecting large-scale system problems by mining console logs. In Johannes F‥urnkranz and Thorsten Joachims, editors, ICML, pages 37–46. Omnipress, 2010. [42] Wei-Wei Zhang, Jian-Hua Wu, and Jie Yu. An improved method of outlier detection based on frequent pattern. In Information Engineering (ICIE), 2010 WASE International Conference on, volume 2, pages 3–6. IEEE, 2010. [43] Xiao-Yun Zhou, Zhi-Hui Sun, Baili Zhang, and Yi-Dong Yang. Fast outlier detection algorithm for high dimensional categorical data streams. Ruan Jian Xue Bao(Journal of Software), 18(4):933–942, 2007.
|