Martín et al., 2021 - Google Patents
An approach to detect user behaviour anomalies within identity federationsMartín et al., 2021
View HTML- Document ID
- 14933249341990958431
- Author
- Martín A
- Beltrán M
- Fernández-Isabel A
- de Diego I
- Publication year
- Publication venue
- computers & security
External Links
Snippet
Abstract User and Entity Behaviour Analytics (UEBA) mechanisms rely on statistical techniques and Machine Learning to determine when a significant deviation from patterns or trends established as a standard for users and entities is occurring. These mechanisms are …
- 230000006399 behavior 0 abstract description 66
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Martín et al. | An approach to detect user behaviour anomalies within identity federations | |
US11888839B1 (en) | Continuous authentication through orchestration and risk calculation post-authentication system and method | |
US12058135B2 (en) | System and method for unauthorized activity detection | |
US10542013B2 (en) | User behavior profile in a blockchain | |
US9679125B2 (en) | Characterizing user behavior via intelligent identity analytics | |
US10873601B1 (en) | Decoy network-based service for deceiving attackers | |
US10721079B2 (en) | Detection of anomalous key material | |
Wu et al. | Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites. | |
Yang et al. | TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings | |
Wang et al. | Behavioral authentication for security and safety | |
Pramila et al. | A survey on adaptive authentication using machine learning techniques | |
Subramanian et al. | An optimal modified bidirectional generative adversarial network for security authentication in cloud Environment | |
Unsel et al. | Risk-based authentication for openstack: a fully functional implementation and guiding example | |
Swati et al. | Innovations in blockchain using artificial intelligence | |
Shakir | User authentication in public cloud computing through adoption of electronic personal synthesis behavior | |
Mondal et al. | Iot data security with machine learning blckchain: Risks and countermeasures | |
Arohan et al. | An introduction to context-aware security and user entity behavior analytics | |
Koved | Usable multi-factor authentication and risk-based authorization | |
Urvashi et al. | Behavior-based approach for fog data analytics: an approach toward security and privacy | |
Junquera-Sánchez et al. | JBCA: Designing an adaptative continuous authentication architecture | |
Kumar et al. | Organization security framework—a defensive mechanism | |
Wild et al. | Proprotect3: An approach for protecting user profile data from disclosure, tampering, and improper use in the context of webid | |
Fojude | Insider Threat Agent: A Behavioral Based Zero Trust Access Control Using Machine Learning Agent | |
Kimbahune et al. | Distributed access control scheme for machine-to-machine communication in IoT using trust factor | |
Varghese et al. | Protection Against SIM Swap Attacks on OTP System |