Online intrusion behaviors: Sequences and time intervals

Main Article Content

Hao-En Chueh
Shun-Chuan Ho
Shih-Peng Chang
Ping-Yu Hsu
Cite this article:  Chueh, H., Ho, S., Chang, S., & Hsu, P. (2010). Online intrusion behaviors: Sequences and time intervals. Social Behavior and Personality: An international journal, 38(10), 1307-1312.


Abstract
Full Text
References
Tables and Figures
Acknowledgments
Author Contact

In this study we model the sequences and time intervals of online intrusion behaviors. To maintain network security, intrusion detection systems monitor network environments; however, most existing intrusion detection systems produce too many intrusion alerts, causing network managers to investigate many potential intrusions individually to determine their validity. To solve this problem, we combined a clustering analysis of the time intervals of online users’ behaviors with a sequential pattern analysis to identify genuine intrusion behaviors. Knowledge of the patterns generated by intruder behaviors can help network managers maintain network security.

Please login and/or purchase the PDF to view the full article.
Please login and/or purchase the PDF to view the full article.
Please login and/or purchase the PDF to view the full article.
Please login and/or purchase the PDF to view the full article.
Please login and/or purchase the PDF to view the full article.

Article Details

© 2010 Scientific Journal Publishers Limited. All Rights Reserved.