DocumentCode :
2349065
Title :
Users behavior model in tasks of computer systems security analysis
Author :
Shyrochin, V.P. ; Mukhin, V.E. ; Bing, Hu Zheng
fYear :
2003
fDate :
8-10 Sept. 2003
Firstpage :
485
Lastpage :
489
Abstract :
Security of computer systems of various purpose and the appropriate information technologies appreciably depends on tools of user identification and authentication, and also on tools of the analysis of their behavior and behavior of their programs during reception of access to those or other information resources. This is devoted to a substantiation of a method of use of a known formalism - state machine for modeling users behavior and to testing of protection tools on detection of attempts of the nonauthorized access to information resources, including at early stages of preparation for such actions
Keywords :
authorisation; finite state machines; message authentication; software tools; user modelling; computer system security analysis; information resource; nonauthorized access; state machine; user authentication tools; user behavior model; user identification tool; Authentication; Computer networks; Computer security; Computerized monitoring; Concrete; Information security; Intrusion detection; National security; Protection; Virtual private networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2003. Proceedings of the Second IEEE International Workshop on
Conference_Location :
Lviv
Print_ISBN :
0-7803-8138-6
Type :
conf
DOI :
10.1109/IDAACS.2003.1249611
Filename :
1249611
Link To Document :
بازگشت