Title :
System survey: building an authenticity profile
Author :
Bascou, Jean-Jacques
Author_Institution :
Groupe de Recherche ICARE, Univ. Toulouse II, France
Abstract :
Protection techniques commonly used on information systems are regularly hacked into by malicious users. This problem is mainly due to the fact that the reliability of such systems is based on correct administration, and on system users´ correct handling. A new protection policy, which consists of confirming authentication of a user by analyzing his behavior, is presented. Such protection has never been used so far mainly because of its poor performances. We propose a statistical and geometrical method in order to build an authenticity profile of the subjects to authenticate. It consists of discovering on the monitored system, some measurable parameters whose values can help us to discriminate authenticated subjects. This method also provides the means to analyze and evaluate the efficiency of the authentication tool before developing it. Finally, we present an experimental application of a user´s authentication by means of typing speed recognition
Keywords :
computer crime; message authentication; principal component analysis; statistical analysis; authentication tool efficiency; authenticity profile; experimental application; geometrical method; hacking; information systems; malicious users; measurable parameters; monitored system; principal component analysis; protection policy; protection techniques; statistical method; systems reliability; typing speed recognition; user authentication; Application software; Authentication; Computer crime; Condition monitoring; Human factors; Information analysis; Information security; Information systems; Permission; Protection;
Conference_Titel :
Computer Communications and Networks, 1998. Proceedings. 7th International Conference on
Conference_Location :
Lafayette, LA
Print_ISBN :
0-8186-9014-3
DOI :
10.1109/ICCCN.1998.998788