A dynamic authentication mechanism for real-time network security

被引:1
|
作者
Bossie, Craig [1 ]
Fiorini, Pierre A. [1 ]
机构
[1] Univ So Maine, Portland, ME 04103 USA
关键词
computer security; network security; dynamic authentication; semi-Markov processes;
D O I
10.1109/IDAACS.2005.283004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Computers networks are only as secure as the weakest computer system attached to them. Thus, the authentication method used by computers on the network affects its safety. Static authentication methods are applied only once at the beginning of a user session. Unfortunately, these methods provide no protection from the interactions a user has after they are logged on and using the system. An ongoing dynamic authentication supplements an intrusion detection system by recognizing a masquerader, or a legitimate user's change of intent. In this paper, we statistically analyze the underlying distributions of the time between user commands and develop an analytic model that emulates the underlying mathematical properties of user behaviors. From this, we show how the probabilities of users executing a sequence of commands during a session can be ascertained. Finally, via our experimental results, we show how the efficacy of dynamic authentication schemes in networked computing environments can be improved by incorporating our techniques.
引用
收藏
页码:360 / 365
页数:6
相关论文
共 50 条
  • [1] A real-time security surveillance system for personal authentication
    Chien, YT
    Huang, YS
    Jeng, SW
    Tasi, YH
    Zhao, HX
    [J]. 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 190 - 195
  • [2] Security Enhancement for Access Control Mechanism in Real-time Wireless Sensor Network
    Sain, Mangal
    Chaudhray, Amlan Jyoti
    Aich, Satyabrata
    Lee, Hoon Jae
    [J]. 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 1135 - 1142
  • [3] Real-time correlation of network security alerts
    Li, Zhitang
    Zhang, Aifang
    Lei, Jie
    Wang, Li
    [J]. ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 73 - +
  • [4] Real-time dynamic security assessment of power grids
    Uros Kerin
    Chris Heyde
    Rainer Krebs
    Edwin Lerch
    [J]. The European Physical Journal Special Topics, 2014, 223 : 2503 - 2516
  • [5] Real-time dynamic security assessment of power grids
    Kerin, Uros
    Heyde, Chris
    Krebs, Rainer
    Lerch, Edwin
    [J]. EUROPEAN PHYSICAL JOURNAL-SPECIAL TOPICS, 2014, 223 (12): : 2503 - 2516
  • [6] NetSecRadar: A Real-Time Visualization System for Network Security
    Zhao, Ying
    Zhou, Fangfang
    Shi, Ronghua
    [J]. 2012 IEEE CONFERENCE ON VISUAL ANALYTICS SCIENCE AND TECHNOLOGY (VAST), 2012, : 281 - 282
  • [8] Visual firewall: Real-time network security monitor
    Lee, CP
    Trost, J
    Gibbs, N
    Beyah, R
    Copeland, JA
    [J]. IEEE WORKSHOP ON VISUALIZATION FOR COMPUTER SECURITY 2005, PROCEEDINGS, 2005, : 129 - 136
  • [9] Real-Time Dynamic Network Anomaly Detection
    Noble, Jordan
    Adams, Niall M.
    [J]. IEEE INTELLIGENT SYSTEMS, 2018, 33 (02) : 5 - 18
  • [10] A Real-Time Intrusion Detection Algorithm for Network Security
    El-Bakry, Hazem M.
    Mastorakis, Nikos
    [J]. PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON APPLIED INFORMATICS AND COMMUNICATIONS, PTS I AND II: NEW ASPECTS OF APPLIED INFORMATICS AND COMMUNICATIONS, 2008, : 533 - +