Title | ||
---|---|---|
Compromised User Credentials Detection Using Temporal Features: A Prudent Based Approach |
Abstract | ||
---|---|---|
This study exposes a serious and rapidly growing cyber threat of compromised legitimate user credentials which is very effective for cyber-criminals to gain trusted relationships with the account owners. Such a compromised user's credentials ultimately result in damage incurred by the attacker at large-scale. Moreover, the detection of compromised legitimate user activities is crucial in competitive and sensitive organizations because wrong data is more difficult to clean from the database. The proposed study presents a novel approach to detect compromised users' activity in a live database. Our approach uses a composition of prudence analysis, ripple down rules (RDR) and simulated experts (SE) to detect and identify accounts that experience a sudden change in behavior. We collected data from a sensitive running database for a period of Six months and evaluate the proposed technique. The results show that this combined model can fully detect outlier user's activity and can provide useful information for the concerned decision maker. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1145/3057039.3057051 | Proceedings of the 9th International Conference on Computer and Automation Engineering |
DocType | ISBN | Citations |
Conference | 978-1-4503-4809-6 | 1 |
PageRank | References | Authors |
0.38 | 19 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Adnan Amin | 1 | 42 | 6.27 |
Sajid Anwar | 2 | 184 | 19.96 |
Babar Shah | 3 | 63 | 15.80 |
Asad Masood Khattak | 4 | 289 | 27.26 |