Nothing Special   »   [go: up one dir, main page]

Challita et al., 2010 - Google Patents

Biometric authentication for intrusion detection systems

Challita et al., 2010

Document ID
439430950756658820
Author
Challita K
Farhat H
Khaldi K
Publication year
Publication venue
2010 First International Conference on Integrated Intelligent Computing

External Links

Snippet

Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection

Similar Documents

Publication Publication Date Title
Prabhakar et al. Biometric recognition: Security and privacy concerns
Jain Biometric recognition: how do I know who you are?
Mudholkar et al. Biometrics authentication technique for intrusion detection systems using fingerprint recognition
WO2014205148A1 (en) Continuous authentication tool
Bhattasali et al. A survey of security and privacy issues for biometrics based remote authentication in cloud
Singh et al. A taxonomy of biometric system vulnerabilities and defences
Sabena et al. A review of vulnerabilities in identity management using biometrics
Mahadi et al. A survey of machine learning techniques for behavioral-based biometric user authentication
Al Solami et al. Continuous biometric authentication: Can it be more practical?
Gao Biometric authentication in smart grid
Alwahaishi et al. Biometric authentication security: an overview
Kaiwartya et al. An Investigation on Biometric Internet Security.
Lone et al. A novel OTP based tripartite authentication scheme
Henniger et al. On security evaluation of fingerprint recognition systems
Kalra et al. A survey on multimodal biometric
Challita et al. Biometric authentication for intrusion detection systems
Lee et al. New approach for detecting leakage of internal information; using emotional recognition technology
JP6890559B2 (en) Access analysis system and access analysis method
Jagadamba et al. A secured authentication system using an effective keystroke dynamics
Avasthi et al. Biometric authentication techniques: a study on keystroke dynamics
Kovalchuk et al. A practical proposal for ensuring the provenance of hardware devices and their safe operation
Zibran Biometric authentication: The security issues
Abo-Alian et al. Authentication as a service for cloud computing
Loh et al. Fuzzy inference for user identification of pressure-based keystroke biometrics
Mohammed et al. A New system for User Authentication Using Android Application