Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
With the motivation of detecting masqueraders on clusters, this work seeks to discriminate different types of users based on their command behavior - in ...
Results show that as few as 10 commands may be enough to recognize a masquerading attacker on a high performance computing cluster, exhibiting high ...
Feb 16, 2003 · In particular we show that as few as 10 commands may be enough to recognize a masquerading attacker on a high per- formance computing cluster.
Abstract. Recent attacks enabled by stolen authentication pass- words and keys have allowed intruders to masquerade as legitimate users on high performance ...
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. Yurcik W., Chao Liu.
“A first step toward detecting ssh identity theft in hpc cluster environments: Discriminating masqueraders based on command behavior” by William Yurcik and ...
With the motivation of detecting masqueraders on HPC clusters, we have been working to discriminate different types of users based on their command behavior.
Apr 25, 2024 · A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. CCGRID ...
Liu, “A First Step Toward Detecting SSH Identity Theft in HPC Cluster Environments, Discriminating Masqueraders Based on Command. Behavior,” 1st Intl.
A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior. Conference Paper. Full ...