Challita et al., 2010 - Google Patents
Biometric authentication for intrusion detection systemsChallita et al., 2010
- Document ID
- 439430950756658820
- Author
- Challita K
- Farhat H
- Khaldi K
- Publication year
- Publication venue
- 2010 First International Conference on Integrated Intelligent Computing
External Links
Snippet
Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection …
- 238000001514 detection method 0 title abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/40—User authentication by quorum, i.e. whereby two or more security principals are required
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Prabhakar et al. | Biometric recognition: Security and privacy concerns | |
Jain | Biometric recognition: how do I know who you are? | |
Mudholkar et al. | Biometrics authentication technique for intrusion detection systems using fingerprint recognition | |
WO2014205148A1 (en) | Continuous authentication tool | |
Bhattasali et al. | A survey of security and privacy issues for biometrics based remote authentication in cloud | |
Singh et al. | A taxonomy of biometric system vulnerabilities and defences | |
Sabena et al. | A review of vulnerabilities in identity management using biometrics | |
Mahadi et al. | A survey of machine learning techniques for behavioral-based biometric user authentication | |
Al Solami et al. | Continuous biometric authentication: Can it be more practical? | |
Gao | Biometric authentication in smart grid | |
Alwahaishi et al. | Biometric authentication security: an overview | |
Kaiwartya et al. | An Investigation on Biometric Internet Security. | |
Lone et al. | A novel OTP based tripartite authentication scheme | |
Henniger et al. | On security evaluation of fingerprint recognition systems | |
Kalra et al. | A survey on multimodal biometric | |
Challita et al. | Biometric authentication for intrusion detection systems | |
Lee et al. | New approach for detecting leakage of internal information; using emotional recognition technology | |
JP6890559B2 (en) | Access analysis system and access analysis method | |
Jagadamba et al. | A secured authentication system using an effective keystroke dynamics | |
Avasthi et al. | Biometric authentication techniques: a study on keystroke dynamics | |
Kovalchuk et al. | A practical proposal for ensuring the provenance of hardware devices and their safe operation | |
Zibran | Biometric authentication: The security issues | |
Abo-Alian et al. | Authentication as a service for cloud computing | |
Loh et al. | Fuzzy inference for user identification of pressure-based keystroke biometrics | |
Mohammed et al. | A New system for User Authentication Using Android Application |