Agrawal, 2013 - Google Patents
User Profiling in GUI based Windows Systems for Intrusion DetectionAgrawal, 2013
View PDF- Document ID
- 6063773353491474496
- Author
- Agrawal A
- Publication year
External Links
Snippet
Intrusion detection is the process of identifying any unauthorized access to a sys-tem. This process inspects user behavior to identify any possible attack or intrusion. There exists two type of intrusion detection systems (IDSs): signature-based IDS and anomaly-based IDS …
- 238000001514 detection method 0 title abstract description 74
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ficco | Malware analysis by combining multiple detectors and observation windows | |
Kaushik et al. | Application of machine learning and deep learning in cybersecurity: An innovative approach | |
Khraisat et al. | Survey of intrusion detection systems: techniques, datasets and challenges | |
Cao et al. | Machine learning to detect anomalies in web log analysis | |
Demme et al. | On the feasibility of online malware detection with performance counters | |
Murmuria et al. | Continuous authentication on mobile devices using power consumption, touch gestures and physical movement of users | |
Wang et al. | Detecting worms via mining dynamic program execution | |
JP7731904B2 (en) | Endpoint Security Using Behavioral Prediction Models | |
Sethi et al. | A novel malware analysis for malware detection and classification using machine learning algorithms | |
Ferdous et al. | Ai-based ransomware detection: A comprehensive review | |
TW202240453A (en) | Method and computer for learning corredpondence between malicious behaviors and execution trace of malware and method for implementing neural network | |
Yunmar et al. | Hybrid Android malware detection: A Review of heuristic-based approach | |
Boot | Applying supervised learning on malware authorship attribution | |
Liu et al. | Accurate and scalable detection and investigation of cyber persistence threats | |
Davies et al. | Majority voting ransomware detection system | |
Sharif et al. | Drsec: Flexible distributed representations for efficient endpoint security | |
Pramila et al. | A survey on adaptive authentication using machine learning techniques | |
Thomas | Machine learning applications for cybersecurity | |
Sabu et al. | Advanced keylogger with keystroke dynamics | |
Deylami et al. | Taxonomy of malware detection techniques: A systematic literature review | |
Nadeem et al. | Intelligent malware defenses | |
Bisht et al. | HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment | |
Yampolskiy et al. | Direct and indirect human computer interaction based biometrics. | |
Ma et al. | A Deep Learning‐Based Trust Assessment Method for Cloud Users | |
Agrawal | User Profiling in GUI based Windows Systems for Intrusion Detection |