PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

User profiling based on multiple aspects of activity in a computer system

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper concerns behavioral biometrics, specifically issues related to the verification of the identity of computer systems users based on user profiling. The profiling method for creating a behavioral profile based on multiple aspects of user activity in a computer system is presented. The work is devoted to the analysis of user activity in environments with a graphical user interface GUI. Mouse activity, keyboard and software usage are taken into consideration. Additionally, an attempt to intrusion detection based on the proposed profiling method and statistical measures is performed. Preliminary studies show that the proposed profiling method could be useful in detecting an intruder masquerading as an authorized user of the computer system. This article presents the preliminary research and conclusions.
Rocznik
Tom
Strony
121--130
Opis fizyczny
Bibliogr. 15 poz., tab., wykr.
Twórcy
  • University of Silesia, Institute of Computer Science, ul. Bedzinska 39, 41-200 Sosnowiec, Poland
autor
  • University of Silesia, Institute of Computer Science, ul. Bedzinska 39, 41-200 Sosnowiec, Poland
Bibliografia
  • [1] AGRAWAL A., User Profiling in GUI based Windows Systems for Intrusion Detection, Master’s Projects, Paper 303, 2013.
  • [2] AHMED A., TRAORE I., A New Biometrics Technology based on Mouse Dynamics, University of Victoria, 2003.
  • [3] BLEHA S., SLIVINSKY C., HUSSEIN B., Computer-access Security Systems using Keystroke Dynamics, Pattern Analysis and Machine Intelligence, 1990.
  • [4] DE VEL O., ANDERSON A., CORNEY M., MOHAY G., Mining E-mail Content for Author Identification Forencics, ACM SIGMOD, 2001.
  • [5] GARG A., RAHALKAR R., UPADHYAYA S., KWIAT K., Profiling Users in GUI Based Systems for Masquerade Detection, The 7th IEEE Information Assurance Workshop, 2006.
  • [6] LUKATSKY Alex, Wykrywanie włamań i aktywna ochrona danych, wyd. Helion, Gliwice, 2005.
  • [7] MONROSE F., RUBIN A., Authentication via Keystroke Dynamics, New York University, 1997.
  • [8] PORWIK P., SOSNOWSKI M., WESOŁOWSKI T., WRÓBEL K., Computational Assessment of a Blood Vessels Compliance: A Procedure Based on Computed Tomography Coronary Angiography, LNAI, Springer, 2011, Vol. 6678/1, pp. 428-435.
  • [9] PUSARA M., BRODLEY C., User Re-Authentication via Mouse Movements, Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004.
  • [10] RICHARDSON Robert, 2010/2011 Computer Crime and Security Survey, New York, 2010.
  • [11] SCHONLAU M. et al., Computer intrusion: detecting masquerades, Statistical Science, 2001, Vol. 16, pp. 58-74.
  • [12] SCHONLAU M., Masquerading user data, http://www.schonlau.net.
  • [13] STARZYNSKA W., Statystyka praktyczna, wyd. PWN, Warszawa, 2005.
  • [14] STOLFO S., HERSHKOP S., WANG K., NIMESKERN O., A Behavior-based Approach To Securing Email Systems, Columbia University, 2003.
  • [15] YAMPOLSKIY Roman, Direct and Indirect Human Computer Interaction Based Biometrics, University at Buffalo, Buffalo, 2007.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-a754dcd5-0886-4b1e-8646-5e962c168041
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.