[go: up one dir, main page]

Martín et al., 2021 - Google Patents

An approach to detect user behaviour anomalies within identity federations

Martín et al., 2021

View HTML
Document ID
14933249341990958431
Author
Martín A
Beltrán M
Fernández-Isabel A
de Diego I
Publication year
Publication venue
computers & security

External Links

Snippet

Abstract User and Entity Behaviour Analytics (UEBA) mechanisms rely on statistical techniques and Machine Learning to determine when a significant deviation from patterns or trends established as a standard for users and entities is occurring. These mechanisms are …
Continue reading at www.sciencedirect.com (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Similar Documents

Publication Publication Date Title
Martín et al. An approach to detect user behaviour anomalies within identity federations
US11888839B1 (en) Continuous authentication through orchestration and risk calculation post-authentication system and method
US12058135B2 (en) System and method for unauthorized activity detection
US10542013B2 (en) User behavior profile in a blockchain
US9679125B2 (en) Characterizing user behavior via intelligent identity analytics
US10873601B1 (en) Decoy network-based service for deceiving attackers
US10721079B2 (en) Detection of anomalous key material
Wu et al. Him of Many Faces: Characterizing Billion-scale Adversarial and Benign Browser Fingerprints on Commercial Websites.
Yang et al. TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
Wang et al. Behavioral authentication for security and safety
Pramila et al. A survey on adaptive authentication using machine learning techniques
Subramanian et al. An optimal modified bidirectional generative adversarial network for security authentication in cloud Environment
Unsel et al. Risk-based authentication for openstack: a fully functional implementation and guiding example
Swati et al. Innovations in blockchain using artificial intelligence
Shakir User authentication in public cloud computing through adoption of electronic personal synthesis behavior
Mondal et al. Iot data security with machine learning blckchain: Risks and countermeasures
Arohan et al. An introduction to context-aware security and user entity behavior analytics
Koved Usable multi-factor authentication and risk-based authorization
Urvashi et al. Behavior-based approach for fog data analytics: an approach toward security and privacy
Junquera-Sánchez et al. JBCA: Designing an adaptative continuous authentication architecture
Kumar et al. Organization security framework—a defensive mechanism
Wild et al. Proprotect3: An approach for protecting user profile data from disclosure, tampering, and improper use in the context of webid
Fojude Insider Threat Agent: A Behavioral Based Zero Trust Access Control Using Machine Learning Agent
Kimbahune et al. Distributed access control scheme for machine-to-machine communication in IoT using trust factor
Varghese et al. Protection Against SIM Swap Attacks on OTP System