2015 Data (Information)
Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data
This dataset is a collection of operating system events associated with user events in a given period of time. It is formatted as a tuple consisting of time, action category, action type, and details related to that action, organized in the following form: [time stamp, category, action type, detail].
An example of a sequence representing one event for a given user may look like:
[00:00:00 01/01/2013, file, open, c:\windows\somefile.txt 15:00:00:02]
Subjects
Files
- RUU.zip application/zip -1146383747 Bytes Download File
More About This Work
- Academic Units
- Computer Science
- Published Here
- September 8, 2021
Related Items
Notes
Keywords: Intrusion detection; Masquerader attacks; Behavioral biometrics; Active authentication; Decoys; Honeyfiles; RUU