2007 41st Annual IEEE International Carnahan Conference on Security Technology 2007
DOI: 10.1109/ccst.2007.4373481
|View full text |Cite
|
Sign up to set email alerts
|

Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
5
3

Relationship

4
4

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 50 publications
0
5
0
Order By: Relevance
“…In this level the security steps are stretched a bit further to avoid malicious accesses by adding some feature like intrusion detection [12]. At this level system alerts the user if any malicious activity is discovered from the user account.…”
Section: High Level Securitymentioning
confidence: 99%
“…In this level the security steps are stretched a bit further to avoid malicious accesses by adding some feature like intrusion detection [12]. At this level system alerts the user if any malicious activity is discovered from the user account.…”
Section: High Level Securitymentioning
confidence: 99%
“…While some research in that area has been done, particularly with command line interfaces [14,15] and more recently with point and click interfaces [16] much more can be accomplished. Usually low-level side effects of user activity are all that is taken to generate a user profile [2] . For example one study concentrated on things like number of open windows, time between new windows and number of words in a window title [16] .…”
Section: Software Interaction Biometricsmentioning
confidence: 99%
“…Behavioral Biometrics are a subset of biometrics, which are generally studied by security system developers. Behavioral biometrics are measurable properties of person's actions which can be used to verify user's identity [1][2][3] . An example of a popular behavioral biometric is the way a person types on a keyboard; it has been definitively shown that it is unique enough to provide reliable person verification [4] .…”
Section: Introductionmentioning
confidence: 99%
“…Also we can't forget that a human intruder is indirectly behind each one of those reflections of behavior and so a large degree of correlation is to be expected. In this section we tried to distill all indirect HCI-based biometrics into the seven well defined groups, but some overlay undoubtedly exists [52].…”
Section: Indirect Hci-based Biometricsmentioning
confidence: 99%