[go: up one dir, main page]

Alqatawna, 2015 - Google Patents

An adaptive multimodal biometric framework for intrusion detection in online social networks

Alqatawna, 2015

View PDF
Document ID
6992985025653442934
Author
Alqatawna J
Publication year
Publication venue
IJCSNS Int J Comput Sci Netw Secur

External Links

Snippet

In this paper we propose an adaptive intrusion detection framework which can be applied to various Online Social Networking Platforms (OSNPs). The idea is based on the fact that most OSNPs are extremely interactive which implies that the activities of the users in these …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2103Challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K9/00Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
    • G06K9/00006Acquiring or recognising fingerprints or palmprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computer systems based on biological models
    • G06N3/02Computer systems based on biological models using neural network models

Similar Documents

Publication Publication Date Title
Dasgupta et al. Machine learning in cybersecurity: a comprehensive survey
Stefan et al. Robustness of keystroke-dynamics based biometrics against synthetic forgeries
Acar et al. A usable and robust continuous authentication framework using wearables
Yusop et al. Advancing passwordless authentication: A systematic review of methods, challenges, and future directions for secure user identity
Kaiwartya et al. An Investigation on Biometric Internet Security.
Stefan et al. Keystroke-dynamics authentication against synthetic forgeries
Yang et al. TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
Piet et al. Network Detection of Interactive {SSH} Impostors Using Deep Learning
Alqatawna An adaptive multimodal biometric framework for intrusion detection in online social networks
Subash et al. Real-time behavioral biometric information security system for assessment fraud detection
Sasikumar et al. Enhancing Cloud Security: A Multi-Factor Authentication and Adaptive Cryptography Approach Using Machine Learning Techniques
Mishra et al. Mitigating the Threat of Multi‐Factor Authentication (MFA) Bypass Through Man‐in‐the‐Middle Attacks Using EvilGinx2
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Ariffin et al. Vulnerabilities detection using attack recognition technique in multi-factor authentication
Yang et al. A keystroke-based continuous user authentication in virtual desktop infrastructure
Sehgal et al. Additional security considerations for cloud
Awad Collective framework for fraud detection using behavioral biometrics
Saravanan et al. CloudSec (3FA): a multifactor with dynamic click colour-based dynamic authentication for securing cloud environment
Shakir Applying Human Behaviour Recognition in Cloud Authentication Method—A Review
Hasan et al. Authentication techniques in cloud and mobile cloud computing
Garg et al. Advancements in Authentication Methods: A Comprehensive Review of Techniques, Challenges, and Future Directions
Gupta et al. Usable identity and access management schemes for smart cities
Urvashi et al. Behavior-based approach for fog data analytics: an approach toward security and privacy
Albayyali et al. Strengthening Active Directory Security: Detecting and Mitigating Kerberoasting Attacks
Sanghi et al. Survey, applications and security of keystroke dynamics for user authentication