By Topic

System survey: building an authenticity profile

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Bascou, J.-J. ; Groupe de Recherche ICARE, Univ. Toulouse II, France

Protection techniques commonly used on information systems are regularly hacked into by malicious users. This problem is mainly due to the fact that the reliability of such systems is based on correct administration, and on system users' correct handling. A new protection policy, which consists of confirming authentication of a user by analyzing his behavior, is presented. Such protection has never been used so far mainly because of its poor performances. We propose a statistical and geometrical method in order to build an authenticity profile of the subjects to authenticate. It consists of discovering on the monitored system, some measurable parameters whose values can help us to discriminate authenticated subjects. This method also provides the means to analyze and evaluate the efficiency of the authentication tool before developing it. Finally, we present an experimental application of a user's authentication by means of typing speed recognition

Published in:

Computer Communications and Networks, 1998. Proceedings. 7th International Conference on

Date of Conference:

12-15 Oct 1998