To read this content please select one of the options below:

Using continuous user authentication to detect masqueraders

Alexandr Seleznyov (Department of Computer Science and Information Systems, University of Jyväskylä, Jyväskylä, Finland)
Seppo Puuronen (Department of Computer Science and Information Systems, University of Jyväskylä, Jyväskylä, Finland)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 1 August 2003

514

Abstract

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The model itself is represented by a number of patterns that describe sequential and temporal behavioural regularities of the users. This paper also discusses implementation issues, describes the authors’ solutions, and provides performance results of the prototype.

Keywords

Citation

Seleznyov, A. and Puuronen, S. (2003), "Using continuous user authentication to detect masqueraders", Information Management & Computer Security, Vol. 11 No. 3, pp. 139-145. https://doi.org/10.1108/09685220310480426

Publisher

:

MCB UP Ltd

Copyright © 2003, MCB UP Limited

Related articles