Digital Fingerprinting Based on Keystroke Dynamics
|
|
|
- Margery Jefferson
- 9 years ago
- Views:
Transcription
1 Digital Fingerprinting Based on Keystroke Dynamics Abstract A. Ahmed, I. Traore and A. Almulhem Department of Electrical and Computer Engineering University of Victoria, Victoria, BC, Canada {aahmed, itraore, Digital fingerprinting is an important but still challenging aspect of network forensics. This paper introduces an effective way to identify an attacker based on a strong behavioral biometric. We introduce a new passive digital fingerprinting technique based on keystroke dynamics biometrics. The technique is based on free text detection and analysis of keystroke dynamics. It allows building a behavioral model from passively collected data, and identifying users based on a very minimal amount of data. Keywords Network forensics, digital fingerprinting, biometrics technologies, keystroke dynamics, free text detection of keystrokes. 1. Introduction In recent years, several studies have emphasized the unprecedented growth in security threats from multiple and varied sources. Traditional protection mechanisms such as access control or firewalls, although valuable, have shown their limits in dealing with these threats. In this context most organizations put a particular emphasis on investigating hacking incidents, allowing them to assess the impact of a penetration and take appropriate measures to ensure secure service continuity, and prevent future similar incidents. The process of analyzing network traffic with the purpose of identifying malicious activities and characterizing their authors is referred to in the literature as Network Forensics (Ranum, 1997). Not surprisingly, network forensics is often confused with the traditional field of computer forensics. In fact, the two are arguably more different than similar (Berghel, 2003). In particular, computer forensics evolved over time following the standard methodologies used by law enforcement in investigating crimes in real life. It is basically concerned with the thorough investigation of computers found in crime scenes. The computer itself is not necessarily a victim of an attack, it is rather a tool used by a criminal. On the other hand, network forensics primarily emerged due to network hacking activities (Ranum, 1997). In this case, the target of an attack is the computer itself. Additionally, the primary objective of the investigation is not necessarily a legal action. Instead, the objective may reduce to typical computer security objectives such as availability and accountability. Investigating computer 94
2 attacks is a challenging task that usually requires analyzing a mass of diverse data. Few organizations are well equipped to tackle this challenge mainly because there are few tools accessible to organizations that will help determine the impact of hacking incidents. An important but extremely difficult aspect of network forensics is attacker profiling (Ahmed and Traore, 2005). This consists of maintaining and using information about the attacker to characterize and recognize him. The profile computed can be used as a digital fingerprint equivalent to physical fingerprint collected in crime scenes. We propose in this project a new approach to user profiling that is based on biometrics. The profiles computed in this case are more accurate since they are based on distinctive biological characteristics of users. The computed biometrics profile can be used to track an attacker throughout computing sessions, allowing identifying easily and accurately compromised systems within the environment. Different types of biometrics are currently available in the market, and are widely used in various security applications. These technologies can be classified into two categories, physiological biometrics and behavioral biometrics. Physiological biometrics identify the user based on physiological characteristics, such as fingerprints and eye retina/iris scanning, whereas behavioral biometrics depend on detecting the behavioral features of the user, such as signature, voice, and keystroke dynamics. The utilization of biometrics technology, however, has so far been limited to identity verification in authentication and access control systems. Hence, important security applications such as network forensics systems have been left out of this technology. The main reason is that traditional biometrics technologies cannot be collected passively which is necessary in network forensics. Behavioral biometrics based on mouse or keystroke dynamics are exceptions. We present in this paper a passive digital fingerprinting technique based on keystroke dynamics biometrics. The rest of the paper is structured as follows. In Section 2, we give an overview of digital fingerprinting, and discuss the feasibility of biometric-based fingerprinting; we also review related work on keystroke dynamics-based fingerprinting techniques published in the literature. In Section 3, we present our approach for passive fingerprinting based on keystroke dynamics. In Section 4, we present and discuss experimental results. Finally, in Section 5, we make some concluding remarks. 2. Passive Fingerprinting 2.1. Background on Digital Fingerprinting Digital fingerprinting consists of gathering knowledge about the attacker methods and tools, as well as his patterns of behavior. Traditionally, digital fingerprinting has targeted primarily the identification of the operating system, services, and applications of a remote host based on data collected through network sniffing or probing. Traditional fingerprinting techniques rely on the assumption that every operating system s IP stack and applications have unique characteristics. As such, 95
3 querying or probing the target system and comparing its response against a database of known response can establish its specific characteristics. Fingerprinting techniques are broadly categorized into two forms: active fingerprinting and passive fingerprinting. Active fingerprinting typically consists of (actively) sending a sequence of probe packets to the target host in order to learn more about the attacker. In this case the risk of being detected is greater for the user of such technique. Passive fingerprinting, in contrast, consists of characterizing the hacker without his knowledge, typically by (passively) observing or sniffing traffic generated by the target host. Passive fingerprinting is the preferred method for network forensic analysts because it gives them the opportunity to observe and study the attacker in an unbiased context, without the hacker knowing that he is being monitored. Existing fingerprinting techniques have so far mostly focused on learning about the attacker methods and tools. Limited attention has been paid to profiling the attacker himself, by identifying unique and distinctive characteristics that could be used to accurately recognize the attacker. Establishing a unique and distinctive profile for the hacker is an important step towards bridging the gap between the current practice of network forensics and the traditional area of digital forensics. Because this would allow associating with the collected hacking evidence a unique signature or fingerprint that if properly handled could be admissible in court, and used to prosecute more effectively authors of hacking incidents. In order to successfully profile attackers using passive fingerprinting, there is a need to look into invariant features that can distinguish one attacker from another. One of these features is the attacker s operating system (OS). In fact, OS passive fingerprinting is a well-established technique that can be used for OS identification by examining the headers of certain packets (especially SYN packets). At best, however, the identification of an attacker s OS is not specific enough to hold him/her accountable. Therefore, it is unlikely that the OS identification alone would lead to an accurate identification of the attacker. Taking OS fingerprinting a step further, physical fingerprinting is a promising technique that has been recently proposed in (Kohno et al. 2005). The technique enables the identification of a specific device, rather than its operating system. In essence, this technique takes advantage of the microscopic deviations in a device s hardware clock; i.e. clock skews. The authors show that these deviations are in fact unique across different devices. Hence, they can be used to uniquely identify different devices physically. The next logical step is to identify the attacker (user) himself/herself. In this case, invariant features associated with the attacker himself/herself are needed. There are several possible features that can be used for such task. In (Almulhem and Traore, 2008), the authors proposed using two features; namely the attacker s linguistics and activity time. The authors showed that clues about the attacker s language and consistent time patterns of activities would enhance the attacker s profiling and identification process. 96
4 2.2. Biometric-based Fingerprinting Proceedings of the Second International Symposium on Traditionally, biometric systems used for authentication or access control operate in two modes: the enrollment mode and the recognition mode. In the first mode, raw biometric data is acquired and processed to extract the biometric features representing the characteristics, which can be used to distinguish between different users. This conversion process produces a processed biometric identification sample, which is stored in a database for future recognition needs. In network forensics analysis, enrollment is not always feasible, simply because a large number of hackers are outsiders, although inside attacks still represent a significant portion of hacking incidents. The focus in network forensics is on recognition, by being able to build from collected data a unique profile for the hacker. Note, however, that storing the initial profile formed for a hacker can speed up future recognition tasks. In this regard, the first recognition session can be considered as a form of enrollment. There are two kinds of biometric recognition processes, namely verification and identification, described a follows: 1. Verification involves one-to-one matching by comparing the processed data sample against the enrolled sample of the same user, resulting in a match or non-match. 2. Identification consists of matching the processed sample against a large number of enrolled samples by conducting a 1 to N matching to identify the user, resulting in an identified user or a non-match. Forensics analysis typically uses identification. For instance, in traditional forensics field the physical fingerprint collected in a crime scene is matched against an existing fingerprints database built and updated over time. Although digital profiling follows the same concept, it faces many practical implementation challenges. First there is no existing hacker profile database. Even though such database can be built progressively, it would require a lot of cooperation between Internet service providers to be effective against outsider attacks. Nonetheless a local database can be implemented by an organization in order to combat insider threat. Another key challenge concerns the collection of the forensics data. In effect most traditional biometrics systems require, in general, special hardware device for data collection and an active involvement of the user who is asked to provide some data sample that can be used to verify his identity. These represent limiting factors for network forensics analysis, which should cover a wider networking scope and should be able to operate passively and transparently. In contrast with traditional biometrics systems, keystroke dynamics, can suitably be used for network forensics and intrusion detection, because they can be collected using readily available human-computer interaction devices (i.e., mouse and keyboard) (Ahmed and Traore, 2005). We propose in this work a passive fingerprinting technique that is based on free-text detection of keystroke dynamics; we discuss related work in the next section. 97
5 2.3. Fingerprinting based on Free-text Detection of Keystrokes Keystroke dynamics recognition systems measure the dwell time and flight time for keyboard actions (Dowland et al. 2002). The raw data collected for keystroke includes the time a key is depressed and the time the key is released. Based on this data, the duration of keystroke (i.e., length of time a key is depressed), and the latency between consecutive keystrokes are calculated and used to construct a set of digraphs, tri-graphs or n-graphs producing a pattern identifying the user. Traditionally, keystroke dynamics recognition has been done by asking the user to type a pre-defined word or set of words in order to get reasonable amount of data for the identification (Bergadano et al. 2002, Bleha et al. 1990, Brown and Rogers, 1993, Gaines et al. 1980, Legget and Williams, 1988). During the enrollment process, the user is also required to enter the same fixed text. For passive fingerprinting, we need to be able to detect the user without requiring him to enter a predefined message or text. So we need to be able to detect dynamically a text freely typed by the user. Research on free text detection of keystroke dynamics has so far been limited. Few related works have been published in the literature including (Dowland et al. 2002, Guneti and Picardi, 2005, Monrose and Rubin, 1997). In (Monrose and Rubin, 1997), the authors collected typing samples from 42 users over a period of 7 weeks, during their routine computing usage, without any particular constraint. The collected timing data consist of keystroke durations and latencies. To recognize individual users, they use a clustering algorithm to partition the data into cluster domains. The typing speed or number of words typed per minute in a given profile is used as the clustering criteria. Various distance measures were studied along with the clustering scheme, including Normalized Euclidian distance, and weighted and non-weighted maximum probability measures. Although the authors obtain 90% correct classification for fixed text detection, they obtain at best (using the weighted probability measure) only 23% correct classification for free text detection. In (Dowland et al. 2002), the authors collected typing samples by monitoring users during their regular computing activities, without any particular constraints imposed on them. A user profile is determined by calculating the mean and standard deviation of digraph latency and by considering only the diagraphs occurring a minimum number of times across the collected typing samples. By collecting and analyzing data for five users they achieve correct acceptance rates in the range of 60%. The results achieved in these earlier works, although encouraging, are highly insufficient in network forensics analysis, especially if one expect using corresponding profiles as legal evidence. Recently in (Guneti and Picardi, 2005), the authors significantly improve on the performance of earlier works by using the degree of disorder of an array to discriminate between two different typing samples. The degree of disorder of an array is computed by summing the distances between the positions of its elements, with respect to the positions of the same elements in the ordered array. Based on the degree of disorder, they define sophisticated distance measures that they use to compare different typing samples. They evaluated their technique through a set of experiments involving 205 individuals, achieving a False Acceptance Rate (FAR) of % and a False Rejection Rate (FRR) of less than 98
6 5%. We propose in this work a new approach for free text detection of keystroke dynamics based on a keyboard layout approximation technique. Although our approach is different from the one proposed by Guneti and Picardi, it achieves comparable performance. 3. Free Text Detection based on Keyboard Layout Mapping 3.1. Detection Approach and Architecture The main challenge faced in free text detection is the need to develop a technique that helps in minimizing the amount of data used to establish the user profile, by only extracting the needed information from the information detected so far in an active session. We propose in this work a free text detection approach based on keyboard layout approximation. Our approach utilizes neural networks to simulate and analyze the user behavior based on the detected digraphs. Figure 1 shows the detector architecture and the flow of data in enrollment and detection modes. In enrollment mode extracted digraphs are encoded with a mapping algorithm. This process is needed in order to convert key codes into another representation, which is relevant and meaningful as an input to the neural network. Figure 1: Detector architecture showing the flow of data in enrollment and detection modes. Raw data collected through various users sessions are processed and converted to a set of digraphs. In enrollment phase the data will be sent to a behavior-modeling unit. The function of this unit is to build a model for the user behavior, which can be represented by a set of numbers. The output of this unit is the keystrokes dynamics signature (KDS), which is stored in a database for future comparisons. When a suspicious session is monitored, the collected data will be processed and sent directly to the signature comparison unit for identification. This unit utilizes a signature comparison technique, which is capable of finding similarities in behaviors and identifying the user to whom this data belongs. The output of this unit is sent to a 99
7 decision-making module in the format of (UID, CR (%)) where UID is the identified user ID, and CR (confidence ratio) is a ratio in percentage format representing how confident the system is that the monitored data belongs to a specific user. One of the important factors to be considered in the enrollment phase is the amount of data needed to enroll the user and create a signature modeling his behavior. The aim is to minimize the enrollment time as much as possible without affecting the accuracy of the system in detection mode. Since the key codes do not reflect the relation between the keys like their absolute or relative positions, the pre-processing stage, illustrated in Figure 2, should include a mapping mechanism in order to convert those sets of keystrokes into numbers, which are suitable to train the neural network with. Such numbers should reflect a specific characteristic for each key and its relation to other keys. The proposed approach is based on a keyboard layout mapping technique. The main idea underlying this technique is to replace each key code by its location on a previously identified keyboard layout. In our implementation we use the QWERTY keyboard layout; each key will be presented by a pair of numbers representing its x and y location. Figure 2: Preprocessing of keystrokes data and modeling the user behavior in enrollment mode. Figure 3: Architecture of the behavior modeling neural network. Neural networks are used to model the relation between the keys and the time used to move between them. Figure 3 shows the neural network architecture used. The 100
8 network is a feed forward multi layer perceptrons (MLP). The number of input nodes is 4 representing the x and y location of the two digraph keys. The output layer consists of one node, which represents the time needed to perform the digraph. The hidden layer consists of 12 nodes. The back propagation technique is used to train the network. A neural network will be trained for each of the enrolled users. The weights of the trained network represent the user keystrokes dynamics signature (KDS). Those signatures will be saved in a repository for the detection process Forensics Analysis Forensics analysis fundamentally involves the detection of the user identity using a set of collected data. This process is usually conducted by comparing the signature of the unknown user to the set of signatures stored in the database. This is not a straightforward process, as attackers are not expected to produce large amount of data. Furthermore in most cases the data collected in detection mode is very small compared to the amount of data used to create each of the users signatures. It is also not possible to force the attacker to provide a specific amount of data or limit him to specific types of actions. This small amount of data cannot be used to build a model and compare it directly to the stored signature. Doing so will require collection of large amount of data and increase the time to detect. In order to overcome this problem another preparatory stage, described in Figure 4, is needed before a detection process can take place. In this stage the same network used for behavior modeling is used. The network is loaded with the weights stored for each user and then fed with a set of inputs representing all possible from-to key combinations. Those inputs and their corresponding outputs are used to train the detection neural network as shown in Figure 4. Figure 4: Training the identification network with data representing enrolled users signatures produced from their behavior modeling neural network. 101
9 Figure 5: Architecture of the identity detection neural network. The detection neural network (Figure 5) consists of 4 layers. The input layer consists of 5 nodes representing the complete digraph data and the elapsed time, which corresponds to the output of the behavior-modeling network. The output layer consists of N nodes each representing one of the enrolled users. The (two) hidden layers consist of 10 and N nodes, respectively. The number of nodes in the network will scale according to the number of enrolled users. Two nodes will be added to the network for each new user. The training process consists of feeding the detection network with the pre-defined set of digraphs and their corresponding output from the behavior-modeling network. The training output will be set to 1 for the node representing the current user and to 0 for the other nodes representing all other enrolled users. For each of the enrolled users a similar set will be created, in each cycle the behavior-modeling network will be loaded with the weights representing the signature of the current user. Figure 6 gives an example of the model built by the behavioral neural network. The 3-D surface reflects the time needed to perform a digraph action from a (x,y) keyboard position to the location of letter "a" on the keyboard for one of the enrolled users. The figure also shows digraphs calculated from an attacking session. The identification network should be able to detect the visible deviation from surface and try to match those points to the closest model. During the detection mode the collected data set is processed and passed directly to the trained detection network. Averages of the outputs for each of the output nodes are calculated. The higher the value at the output node, the more confident the system that this data belongs to the user linked to this node. 102
10 Figure 6: Attacker's data compared to the model built by the behavior modeling network. The surface represents user 1's model. The scattered points belong to user 2. Noticeable deviation from the surface indicates a behaviour difference. 4. Experiments We conducted a wide range experiment involving twenty-two participants. 16 males and 6 females, with varying computer skills and ages ranging from 13 to 48 years, were involved in this experiment. Each user was asked to install the client software on his workstation and to use the workstation for his daily use throughout the duration of the experiment. The experiment lasted for 9 weeks and we were able to collect an average of digraphs per user. The overall performance achieved by our detector includes a false acceptance rate (FAR) of % and a false rejection rate (FRR) of 4.82%. 5. Conclusions Network forensics focuses on the capture and analysis of the actions of an intruder for investigative purpose. Using our proposed biometrics system it would be possible to derive from intrusive actions a unique profile that can be used to identify the perpetrator. This may be used to track perpetrators across cooperating sites, fight against insider threat or could be used as evidence against malicious users in court. The main challenge in this research is that the evidence has to be collected and preserved correctly to pass the admissibility test - a screening process by the court. The signature created by the technique presented in this paper can be considered as a strong identity proof as it is based on a human behavioral biometric which is unique for each user. Another issue is the accuracy of the computed profiles. Although the performance results achieved above are encouraging, we still need to improve them significantly for the proposed technology to achieve widespread acceptance. 103
11 References Ahmed, A.A.E, and Traore, I. (2005), "Detecting Computer Intrusions Using Behavioral Biometrics", Proc. of 3rd Ann. Conf. on Priv., Sec. and Trust, St. And. NB, Canada, pp Almulhem, A., and Traore, I. (2008), "Profiling distributed connection chains", International Journal of Communication Networks and Distributed Systems, 1(1), pp Bergadano, F., Guneti, D., and Picardi, C. (2002), "User Authentication through Keystroke Dynamics", ACM Trans. on Info and System Security, Vol. 5, No. 4, Nov 2002, pp Berghel, H. (2003), The discipline of internet forensics, Com. of the ACM, 46(8), pp Bleha, S., Slivinsky, C., and Hussein, B., (1990), "Computer-access Security Systems using Keystroke Dynamics", IEEE Trans. Patt. Anal. Mach. Int., PAMI-12, 12, pp Brown, M., and Rogers, S.J. (1993), "User Identification Via Keystroke Characteristics of Typed Names Using Neural Networks", Int. J. Man-Machine Studies, Vol. 39, pp Dowland, P., Furnell, S., and Papadaki, M. (2002), "Keystroke Analysis as a Method of Advanced User Authentication and Response", Proceedings of the IFIP TC11 17th Int. Conference on Information Security: Visions and Perspectives, May 07-09, 2002, pp Gaines, R., Lisowski, W., Press, S., and Shapiro, N. (1980), "Authentication by Keystroke Timing: Some Preliminary Results", Rand. Report R-256-NSF, Rand Corporation. Guneti D., and C. Picardi (2005), "Keystroke Analysis of Free Text", ACM Transactions on Information and System Security, Vol. 8, No. 3, Aug. 2005, pp Legget, J, and Williams, G. (1988), "Dynamic Identity Verification via Keystroke Characteristics", Int. J. Man-Mach. Stud., 35, pp Monrose, F., and Rubin, A. (1997), "Authentication via keystroke dynamics", Proceedings of the 4th ACM conf. on Comp. and comm. security, Apr 1-4, Zurich, Switzerland, pp M. Ranum (1997), Network Forensics: Network traffic Monitoring, Tech. Rep., NFR Inc. Kohno, T., Broido, A., and Claffy, K.C. (2005), Remote physical device fingerprinting, IEEE Transactions on Dependable and Secure Computing, 2(2), Apr.-Jun., pp
User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device
2008 International Conference on Computer and Electrical Engineering User Authentication using Combination of Behavioral Biometrics over the Touchpad acting like Touch screen of Mobile Device Hataichanok
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining
Extend Table Lens for High-Dimensional Data Visualization and Classification Mining CPSC 533c, Information Visualization Course Project, Term 2 2003 Fengdong Du [email protected] University of British Columbia
Cyberspace Security Use Keystroke Dynamics. Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science
Cyberspace Security Use Keystroke Dynamics by Alaa Darabseh, B.S. and M.S. A Doctoral Dissertation In Computer Science Submitted to the Graduate Faculty of Texas Tech University in Partial Fulfillment
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
THE ROLE OF IDS & ADS IN NETWORK SECURITY
THE ROLE OF IDS & ADS IN NETWORK SECURITY The Role of IDS & ADS in Network Security When it comes to security, most networks today are like an egg: hard on the outside, gooey in the middle. Once a hacker
The Development of a Pressure-based Typing Biometrics User Authentication System
The Development of a Pressure-based Typing Biometrics User Authentication System Chen Change Loy Adv. Informatics Research Group MIMOS Berhad by Assoc. Prof. Dr. Chee Peng Lim Associate Professor Sch.
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
An Analysis of Keystroke Dynamics Use in User Authentication
An Analysis of Keystroke Dynamics Use in User Authentication Sam Hyland (0053677) Last Revised: April 7, 2004 Prepared For: Software Engineering 4C03 Introduction Authentication is an important factor
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002
Outline Intrusion Detection CS 239 Security for Networks and System Software June 3, 2002 Introduction Characteristics of intrusion detection systems Some sample intrusion detection systems Page 1 Page
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
User Behaviour Analytics
User Behaviour Analytics How do they know its really you? White Paper Sept 2015 Ezmcom Inc. 4701 Patrick Henry Drive BLDG 7, Santa Clara, CA, 95054, US Executive Summary Authentication has traditionally
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Network- vs. Host-based Intrusion Detection
Network- vs. Host-based Intrusion Detection A Guide to Intrusion Detection Technology 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free: 800.776.2362 Fax: 678.443.6477
Radware s Behavioral Server Cracking Protection
Radware s Behavioral Server Cracking Protection A DefensePro Whitepaper By Renaud Bidou Senior Security Specialist,Radware October 2007 www.radware.com Page - 2 - Table of Contents Abstract...3 Information
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
International Journal of Innovative Research in Computer and Communication Engineering
Authentication System for Online Banking Application by Using Keystroke Dynamic on Android Phones Dnyaneshwari S. Dhundad, Prof. D. N. Rewadkar Post Graduate Student, Dept. of Computer Engineering, RMD
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Second-generation (GenII) honeypots
Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. [email protected] Abstract Honeypots are security resources which trap malicious activities, so they
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
An Enhanced Countermeasure Technique for Deceptive Phishing Attack
An Enhanced Countermeasure Technique for Deceptive Phishing Attack K. Selvan 1, Dr. M. Vanitha 2 Research Scholar and Assistant Professor, Department of Computer Science, JJ College of Arts and Science
LOAD BALANCING AS A STRATEGY LEARNING TASK
LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT
Identity Theft, Computers and Behavioral Biometrics
Identity Theft, Computers and Behavioral Biometrics Robert Moskovitch, Clint Feher, Arik Messerman, Niklas Kirschnick, Tarik Mustafić, Ahmet Camtepe, Bernhard Löhlein, Ulrich Heister, Sebastian Möller,
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Keywords - Intrusion Detection System, Intrusion Prevention System, Artificial Neural Network, Multi Layer Perceptron, SYN_FLOOD, PING_FLOOD, JPCap
Intelligent Monitoring System A network based IDS SONALI M. TIDKE, Dept. of Computer Science and Engineering, Shreeyash College of Engineering and Technology, Aurangabad (MS), India Abstract Network security
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
Advanced Honeypot System for Analysing Network Security
ISSN: 2347-3215 Volume 2 Number 4 (April-2014) pp. 65-70 www.ijcrar.com Advanced Honeypot System for Analysing Network Security Suruchi Narote 1* and Sandeep Khanna 2 1 Department of Computer Engineering.
A survey on Data Mining based Intrusion Detection Systems
International Journal of Computer Networks and Communications Security VOL. 2, NO. 12, DECEMBER 2014, 485 490 Available online at: www.ijcncs.org ISSN 2308-9830 A survey on Data Mining based Intrusion
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme
Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Security from the Ground Up eblvd uses a hybrid-asp model designed expressly to ensure robust, secure operation.
eblvd enables secure, cloud-based access to a PC or server over the Internet. Data, keyboard, mouse and display updates are transmitted over a highly compressed, encrypted stream, yielding "as good as
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM
A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
ThreatSpike Dome: A New Approach To Security Monitoring
ThreatSpike Dome: A New Approach To Security Monitoring 2015 ThreatSpike Labs Limited The problem with SIEM Hacking, insider and advanced persistent threats can be difficult to detect with existing product
Penetration Testing //Vulnerability Assessment //Remedy
A Division Penetration Testing //Vulnerability Assessment //Remedy In Penetration Testing, part of a security assessment practice attempts to simulate the techniques adopted by an attacker in compromising
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
On A Network Forensics Model For Information Security
On A Network Forensics Model For Information Security Ren Wei School of Information, Zhongnan University of Economics and Law, Wuhan, 430064 [email protected] Abstract: The employment of a patchwork
131-1. Adding New Level in KDD to Make the Web Usage Mining More Efficient. Abstract. 1. Introduction [1]. 1/10
1/10 131-1 Adding New Level in KDD to Make the Web Usage Mining More Efficient Mohammad Ala a AL_Hamami PHD Student, Lecturer m_ah_1@yahoocom Soukaena Hassan Hashem PHD Student, Lecturer soukaena_hassan@yahoocom
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
1.1.1 Introduction to Cloud Computing
1 CHAPTER 1 INTRODUCTION 1.1 CLOUD COMPUTING 1.1.1 Introduction to Cloud Computing Computing as a service has seen a phenomenal growth in recent years. The primary motivation for this growth has been the
On-Premises DDoS Mitigation for the Enterprise
On-Premises DDoS Mitigation for the Enterprise FIRST LINE OF DEFENSE Pocket Guide The Challenge There is no doubt that cyber-attacks are growing in complexity and sophistication. As a result, a need has
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.
Definition Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means. Description Physiological biometrics is based
Visual-based ID Verification by Signature Tracking
Visual-based ID Verification by Signature Tracking Mario E. Munich and Pietro Perona California Institute of Technology www.vision.caltech.edu/mariomu Outline Biometric ID Visual Signature Acquisition
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
Exam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Continuous Biometric User Authentication in Online Examinations
2010 Seventh International Conference on Information Technology Continuous Biometric User Authentication in Online Examinations Eric Flior, Kazimierz Kowalski Department of Computer Science, California
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Detecting Credit Card Fraud
Case Study Detecting Credit Card Fraud Analysis of Behaviometrics in an online Payment environment Introduction BehavioSec have been conducting tests on Behaviometrics stemming from card payments within
IMPLEMENTING FORENSIC READINESS USING PERFORMANCE MONITORING TOOLS
Chapter 18 IMPLEMENTING FORENSIC READINESS USING PERFORMANCE MONITORING TOOLS Franscois van Staden and Hein Venter Abstract This paper proposes the use of monitoring tools to record data in support of
Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems
Intelligent Human Machine Interface Design for Advanced Product Life Cycle Management Systems Zeeshan Ahmed Vienna University of Technology Getreidemarkt 9/307, 1060 Vienna Austria Email: [email protected]
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Neural Networks for Intrusion Detection and Its Applications
, July 3-5, 2013, London, U.K. Neural Networks for Intrusion Detection and Its Applications E.Kesavulu Reddy, Member IAENG Abstract: With rapid expansion of computer networks during the past decade, security
A solution for comprehensive network security
Applied mathematics in Engineering, Management and Technology 2 (6) 2014:22-26 www.amiemt-journal.com A solution for comprehensive network security Seyed Mehdi Mousavi Payam Noor University (PNU), IRAN
Application of Data Mining Techniques in Intrusion Detection
Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology [email protected] Abstract: The article introduced the importance of intrusion detection, as well as
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
Performance Evaluation of Intrusion Detection Systems
Performance Evaluation of Intrusion Detection Systems Waleed Farag & Sanwar Ali Department of Computer Science at Indiana University of Pennsylvania ABIT 2006 Outline Introduction: Intrusion Detection
KEITH LEHNERT AND ERIC FRIEDRICH
MACHINE LEARNING CLASSIFICATION OF MALICIOUS NETWORK TRAFFIC KEITH LEHNERT AND ERIC FRIEDRICH 1. Introduction 1.1. Intrusion Detection Systems. In our society, information systems are everywhere. They
Understanding Web personalization with Web Usage Mining and its Application: Recommender System
Understanding Web personalization with Web Usage Mining and its Application: Recommender System Manoj Swami 1, Prof. Manasi Kulkarni 2 1 M.Tech (Computer-NIMS), VJTI, Mumbai. 2 Department of Computer Technology,
Web Forensic Evidence of SQL Injection Analysis
International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University
Flow-based detection of RDP brute-force attacks
Flow-based detection of RDP brute-force attacks Martin Vizváry [email protected] Institute of Computer Science Masaryk University Brno, Czech Republic Jan Vykopal [email protected] Institute of Computer
Performance Evaluation of Intrusion Detection Systems using ANN
Performance Evaluation of Intrusion Detection Systems using ANN Khaled Ahmed Abood Omer 1, Fadwa Abdulbari Awn 2 1 Computer Science and Engineering Department, Faculty of Engineering, University of Aden,
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
AT&T. ip vpn portfolio. integrated. IP VPN solutions. for the enterprise. Communication Systems International Incorporated
AT&T ip vpn portfolio integrated IP VPN solutions for the enterprise Communication Systems International Incorporated Applications of IP VPN Technology Applications of IP VPN Technology Sales Force Automation
Research on Clustering Analysis of Big Data Yuan Yuanming 1, 2, a, Wu Chanle 1, 2
Advanced Engineering Forum Vols. 6-7 (2012) pp 82-87 Online: 2012-09-26 (2012) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/aef.6-7.82 Research on Clustering Analysis of Big Data
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
Biometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT
SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT V. Devi PG Scholar, Department of CSE, Indira Institute of Engineering & Technology, India. J. Chenni Kumaran Associate Professor,
Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus
Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
RSA Adaptive Authentication For ecommerce
RSA Adaptive Authentication For ecommerce Risk-based 3D Secure for Credit Card Issuers SOLUTION BRIEF RSA FRAUD & RISK INTELLIGENCE The Threat of ecommerce Fraud ecommerce fraud is a threat to both issuers
