Data (Information)

Active authentication using file system decoys and user behavior modeling: results of a large scale study: Data

Stolfo, Salvatore; Hershkop, Shlomo

This dataset is a collection of operating system events associated with user events in a given period of time. It is formatted as a tuple consisting of time, action category, action type, and details related to that action, organized in the following form: [time stamp, category, action type, detail].

An example of a sequence representing one event for a given user may look like:
[00:00:00 01/01/2013, file, open, c:\windows\somefile.txt 15:00:00:02]


More About This Work

Academic Units
Computer Science
Published Here
September 8, 2021


Keywords: Intrusion detection; Masquerader attacks; Behavioral biometrics; Active authentication; Decoys; Honeyfiles; RUU