Behavioural profiling for impostor detection in mobile networks
Authors: Zincir, I., Furnell, S. and Phippen, A.
Journal: 9th European Conference on Information Warfare and Security 2010, ECIW 2010
Pages: 334-342
ISBN: 9781622765355
Abstract:The object of this research is to propose a new approach, using behavioural profiling as the basis of an Intrusion Detection System (IDS) to detect impostors who masquerade as legitimate users in mobile networks. In behaviour-based IDS, historical user profiles are created and then compared with the real-time ones in order to detect malicious activity. If a user changes behaviour this results in alerting the system since it is highlighted as an anomalous activity that might suggest an impostor is at work. To assess this approach C4.5 machine learning algorithm is applied over Massachusetts Institute of Technology's Reality Mining Dataset and successful results are achieved.
Source: Scopus
Behavioural profiling for impostor detection in mobile networks
Authors: Zincir, I., Furnell, S. and Phippen, A.
Journal: Eur. Conf. Inf. Warf. Secur., ECIW
Pages: 334-342
ISBN: 9781622765355
Source: Manual