메뉴 건너뛰기




Volumn , Issue , 2007, Pages 138-145

Indirect human computer interaction-based biometrics for intrusion detection systems

Author keywords

ANN; HCI. system calls; IDS; Indirect biometrics; network traffic

Indexed keywords

BIOMETRICS; COMPUTER CRIME; COMPUTER SYSTEMS; ELECTRIC CURRENTS; FLOW INTERACTIONS; HUMAN COMPUTER INTERACTION; INTERNET; SECURITY OF DATA; SENSORS; SIGNAL DETECTION; TECHNOLOGY; WORD PROCESSING;

EID: 47849105422     PISSN: 10716572     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CCST.2007.4373481     Document Type: Conference Paper
Times cited : (9)

References (76)
  • 4
    • 47849105957 scopus 로고    scopus 로고
    • Available at:, Retrieved October 24, 2005
    • BioPassword, "Biopassword," Available at: http://www. biopassword.com/bp2/welcome.asp, Retrieved October 24, 2005.
    • Biopassword
  • 5
    • 34147151570 scopus 로고    scopus 로고
    • Available at:, Retrieved July 12, 2006
    • J. Ilonen, "Keystroke dynamics," Available at: www.it.lut.fi/kurssit/03-04/010970000/seminars/Ilonen.pdf, Retrieved July 12, 2006.
    • Keystroke dynamics
    • Ilonen, J.1
  • 11
    • 60749096615 scopus 로고    scopus 로고
    • G. Bartolacci, M. Curtin, M. Katzenberg, N. Nwana, S.-H. Cha, and C. C. Tappert, Long-Text Keystroke Biometric Applications over the Internet, presented at MLMTA, 2005.
    • G. Bartolacci, M. Curtin, M. Katzenberg, N. Nwana, S.-H. Cha, and C. C. Tappert, " Long-Text Keystroke Biometric Applications over the Internet," presented at MLMTA, 2005.
  • 13
    • 84883286001 scopus 로고    scopus 로고
    • Detecting Computer Intrusions Using Behavioral Biometrics
    • presented at, St. Andrews, New Brunswick, Canada, October
    • A. A. E. Ahmed and I. Traore, "Detecting Computer Intrusions Using Behavioral Biometrics," presented at Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, October, 2005.
    • (2005) Third Annual Conference on Privacy, Security and Trust
    • Ahmed, A.A.E.1    Traore, I.2
  • 14
    • 33745449771 scopus 로고    scopus 로고
    • Anomaly Intrusion Detection based on Biometrics
    • presented at, United States Military Academy, West Point, NY, June
    • A. A. E. Ahmed and I. Traore, "Anomaly Intrusion Detection based on Biometrics," presented at Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2005.
    • (2005) Workshop on Information Assurance
    • Ahmed, A.A.E.1    Traore, I.2
  • 15
    • 8844279221 scopus 로고    scopus 로고
    • A Behavioral Biometric System Based on Human Computer Interaction
    • H. Gamboa and V.-. A. Fred., "A Behavioral Biometric System Based on Human Computer Interaction," In Proceedings of SPIE, 2004.
    • (2004) Proceedings of SPIE
    • Gamboa, H.1    Fred, V.A.2
  • 20
    • 47849117864 scopus 로고    scopus 로고
    • Caslon-Analytics, presented at Available at: http://www.caslon.com.au/ biometricsnote6.htm, Retrieved October 2, 2005.
    • Caslon-Analytics, presented at Available at: http://www.caslon.com.au/ biometricsnote6.htm, Retrieved October 2, 2005.
  • 22
    • 47849087378 scopus 로고    scopus 로고
    • S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang, and O. Nimeskern, Combining Behavior Models to Secure Email Systems, presented at CU Tech Report, Available at: www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf, April 2003.
    • S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang, and O. Nimeskern, "Combining Behavior Models to Secure Email Systems," presented at CU Tech Report, Available at: www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf, April 2003.
  • 25
    • 67649949220 scopus 로고    scopus 로고
    • Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process
    • presented at Security and Reliability in Information Systems and Networks Track, Setubal Portugal, August
    • G. Frantzeskou, S. Gritzalis, and S. MacDonell, "Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process," presented at 1st International Conference on eBusiness and Telecommunication Networks - Security and Reliability in Information Systems and Networks Track, Setubal Portugal, August 2004.
    • (2004) 1st International Conference on eBusiness and Telecommunication Networks
    • Frantzeskou, G.1    Gritzalis, S.2    MacDonell, S.3
  • 26
    • 37349079305 scopus 로고    scopus 로고
    • Behavior Based Identification of Network Intruders
    • presented at, Buffalo, NY, February 24
    • R. V. Yampolskiy, "Behavior Based Identification of Network Intruders," presented at 19th Annual CSE Graduate Conference (Grad-Conf2006), Buffalo, NY, February 24, 2006.
    • (2006) 19th Annual CSE Graduate Conference (Grad-Conf2006)
    • Yampolskiy, R.V.1
  • 29
    • 47849086305 scopus 로고    scopus 로고
    • A. Brömnme and S. Al-Zubi, Multifactor Biometric Sketch Authentication, presented at In A. Brömme and C. Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003.
    • A. Brömnme and S. Al-Zubi, "Multifactor Biometric Sketch Authentication," presented at In A. Brömme and C. Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003.
  • 30
    • 84860283359 scopus 로고    scopus 로고
    • Using an Active Shape Structural Model for Biometric Sketch Recognition
    • presented at, Magdeburg, Germany, September
    • S. Al-Zubi, A. Brömme, and K. Tönnies, "Using an Active Shape Structural Model for Biometric Sketch Recognition," presented at In Proceedings of DAGM, Magdeburg, Germany, September 2003.
    • (2003) In Proceedings of DAGM
    • Al-Zubi, S.1    Brömme, A.2    Tönnies, K.3
  • 34
    • 47849121948 scopus 로고    scopus 로고
    • T. Lane and C. E. Brodley, Detecting the Abnormal: Machine Learning in Computer Security, presented at Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
    • T. Lane and C. E. Brodley, "Detecting the Abnormal: Machine Learning in Computer Security," presented at Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
  • 35
    • 33845948788 scopus 로고    scopus 로고
    • Profiling Users in GUI Based Systems for Masquerade Detection
    • presented at The , West Point, New York, USA, June 21-23
    • A. Garg, R. Rahalkar, S. Upadhyaya, and K. Kwiat, "Profiling Users in GUI Based Systems for Masquerade Detection," presented at The 7th IEEE Information Assurance Workshop (IAWorkshop 2006), West Point, New York, USA, June 21-23, 2006.
    • (2006) 7th IEEE Information Assurance Workshop (IAWorkshop
    • Garg, A.1    Rahalkar, R.2    Upadhyaya, S.3    Kwiat, K.4
  • 38
    • 47849125042 scopus 로고    scopus 로고
    • J. P. Anderson, Computer Security Threat Monitoring and Surveillance, presented at Technical Report. James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
    • J. P. Anderson, "Computer Security Threat Monitoring and Surveillance," presented at Technical Report. James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
  • 41
    • 84942248748 scopus 로고    scopus 로고
    • Finding the vocabulary of program behavior data for anomaly detection
    • presented at, 22-24 April
    • C. C. Michael, "Finding the vocabulary of program behavior data for anomaly detection," presented at DARPA Information Survivability Conference and Exposition, 2003, 22-24 April 2003.
    • (2003) DARPA Information Survivability Conference and Exposition
    • Michael, C.C.1
  • 42
    • 84940104123 scopus 로고    scopus 로고
    • A Data Mining Framework for Building Intrusion Detection Models
    • presented at, Okland, CA
    • W. Lee, S. J. Stolfo, and K. W. Mok, "A Data Mining Framework for Building Intrusion Detection Models," presented at IEEE Symposium on Security and Privacy, Okland, CA, 1999.
    • (1999) IEEE Symposium on Security and Privacy
    • Lee, W.1    Stolfo, S.J.2    Mok, K.W.3
  • 44
    • 0036095845 scopus 로고    scopus 로고
    • Enhancing Profiles for Anomaly Detection Using Time Granularities
    • presented at
    • Y. Li, N. Wu, S. Jajodia, and X. S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities," presented at Journal of Computer Security, 2002.
    • (2002) Journal of Computer Security
    • Li, Y.1    Wu, N.2    Jajodia, S.3    Wang, X.S.4
  • 45
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • presented at
    • K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach," presented at Software Engineering, 1995.
    • (1995) Software Engineering
    • Ilgun, K.1    Kemmerer, R.A.2    Porras, P.A.3
  • 52
    • 77954316519 scopus 로고    scopus 로고
    • Investigation of neural network classification of computer network attacks
    • presented at Research and Education, 11-13 Aug
    • Z. Zhang and C. Manikopoulos, "Investigation of neural network classification of computer network attacks," presented at Proceedings of International Conference on Information Technology: Research and Education, 11-13 Aug. 2003.
    • (2003) Proceedings of International Conference on Information Technology
    • Zhang, Z.1    Manikopoulos, C.2
  • 56
    • 47849124503 scopus 로고    scopus 로고
    • D. Novikov., Neural Networks to Intrusion Detection., presented at MS thesis, Rochester Institute of Technology. Rochester, NY, October 2005.
    • D. Novikov., "Neural Networks to Intrusion Detection.," presented at MS thesis, Rochester Institute of Technology. Rochester, NY, October 2005.
  • 58
    • 0031274649 scopus 로고    scopus 로고
    • Wide area Internet traffic patterns and characteristics
    • presented at, November
    • K. Thompson, G. Miller, and R. Wilder, "Wide area Internet traffic patterns and characteristics," presented at In IEEE Network, November 1997.
    • (1997) In IEEE Network
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 59
    • 3943082567 scopus 로고    scopus 로고
    • Detecting malicious software by monitoring anomalous windows registry accesses
    • presented at Technical report, CUCS Technical Report
    • F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo, "Detecting malicious software by monitoring anomalous windows registry accesses," presented at Technical report, CUCS Technical Report, 2001.
    • (2001)
    • Apap, F.1    Honig, A.2    Hershkop, S.3    Eskin, E.4    Stolfo, S.5
  • 60
    • 47849092496 scopus 로고    scopus 로고
    • A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson, and G. R. Ganger, Storage-based intrusion detection: Watching storage activity for suspicious behavior, presented at Technical report CMU - CS - 02 - 179. Carnegie Mellon University, October 2002.
    • A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson, and G. R. Ganger, "Storage-based intrusion detection: Watching storage activity for suspicious behavior," presented at Technical report CMU - CS - 02 - 179. Carnegie Mellon University, October 2002.
  • 68
    • 0034593307 scopus 로고    scopus 로고
    • Characterizing the Behavior of a Program Using Multiple-Length N-grams
    • presented at, Cork, Ireland, Sept. 19-21
    • C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams," presented at Proceedings of the New Security Paradigms Workshop 2000, Cork, Ireland, Sept. 19-21, 2000.
    • (2000) Proceedings of the New Security Paradigms Workshop
    • Marceau, C.1
  • 72
    • 47849096882 scopus 로고    scopus 로고
    • DARPA, Intrusion Detection Evaluation, presented at MIT Lincoln Laboratory, Available at: http://www.II.mit.edu/ist/ideval, 1998.
    • DARPA, "Intrusion Detection Evaluation," presented at MIT Lincoln Laboratory, Available at: http://www.II.mit.edu/ist/ideval, 1998.
  • 73
    • 0013114810 scopus 로고    scopus 로고
    • Mining in a Data-Flow Environment: Experience in Network Intrusion Detection
    • presented at, San Diego, CA
    • W. Lee, S. Stolfo, and K. Mok, "Mining in a Data-Flow Environment: Experience in Network Intrusion Detection," presented at In Proceedings of the 5th ACM SIGKDD, San Diego, CA, 1999.
    • (1999) In Proceedings of the 5th ACM SIGKDD
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 74
    • 47849092251 scopus 로고    scopus 로고
    • R. V. Yampolskiy, Feature Extraction Methods for Character Recognition, presented at Master's Thesis. Rochester Institute of Technology, Rochester, NY, May 10, 2004.
    • R. V. Yampolskiy, "Feature Extraction Methods for Character Recognition," presented at Master's Thesis. Rochester Institute of Technology, Rochester, NY, May 10, 2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.