The University of Southampton
University of Southampton Institutional Repository

Biometric authentication for intrusion detection systems

Biometric authentication for intrusion detection systems
Biometric authentication for intrusion detection systems

Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection systems aim to authenticate legitimate users once they log in to the system, as well as to prevent access to unauthorized people who try to impersonate other users. The main goal of this paper is to introduce and implement a novel approach that uses the fingerprint technique to complement a host-based intrusion detection system in order to improve its level of authentication, which would allow us to detect more effectively any misuse of the computer system that is running it.

195-199
Challita, Khalil
d763f952-da59-4221-9fc7-265bfc9aa3d7
Farhat, Hikmat
4b7583f4-d03c-425e-a65a-82c0e157e7e6
Khaldi, Khaldoun
5dcf4cef-62d1-4bc9-95a2-ceb2e0377649
Challita, Khalil
d763f952-da59-4221-9fc7-265bfc9aa3d7
Farhat, Hikmat
4b7583f4-d03c-425e-a65a-82c0e157e7e6
Khaldi, Khaldoun
5dcf4cef-62d1-4bc9-95a2-ceb2e0377649

Challita, Khalil, Farhat, Hikmat and Khaldi, Khaldoun (2010) Biometric authentication for intrusion detection systems. In Proceedings - 1st International Conference on Integrated Intelligent Computing, ICIIC 2010. pp. 195-199 . (doi:10.1109/ICIIC.2010.15).

Record type: Conference or Workshop Item (Paper)

Abstract

Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection systems aim to authenticate legitimate users once they log in to the system, as well as to prevent access to unauthorized people who try to impersonate other users. The main goal of this paper is to introduce and implement a novel approach that uses the fingerprint technique to complement a host-based intrusion detection system in order to improve its level of authentication, which would allow us to detect more effectively any misuse of the computer system that is running it.

This record has no associated files available for download.

More information

Published date: 5 August 2010
Venue - Dates: 1st International Conference on Integrated Intelligent Computing, ICIIC 2010, , Bangalore, India, 2010-08-05 - 2010-08-07

Identifiers

Local EPrints ID: 492301
URI: http://eprints.soton.ac.uk/id/eprint/492301
PURE UUID: 115daefd-5e46-4b55-911b-6a191921b6c4
ORCID for Hikmat Farhat: ORCID iD orcid.org/0000-0002-5043-227X

Catalogue record

Date deposited: 23 Jul 2024 17:12
Last modified: 24 Jul 2024 02:06

Export record

Altmetrics

Contributors

Author: Khalil Challita
Author: Hikmat Farhat ORCID iD
Author: Khaldoun Khaldi

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×