Biometric authentication for intrusion detection systems
Biometric authentication for intrusion detection systems
Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection systems aim to authenticate legitimate users once they log in to the system, as well as to prevent access to unauthorized people who try to impersonate other users. The main goal of this paper is to introduce and implement a novel approach that uses the fingerprint technique to complement a host-based intrusion detection system in order to improve its level of authentication, which would allow us to detect more effectively any misuse of the computer system that is running it.
195-199
Challita, Khalil
d763f952-da59-4221-9fc7-265bfc9aa3d7
Farhat, Hikmat
4b7583f4-d03c-425e-a65a-82c0e157e7e6
Khaldi, Khaldoun
5dcf4cef-62d1-4bc9-95a2-ceb2e0377649
5 August 2010
Challita, Khalil
d763f952-da59-4221-9fc7-265bfc9aa3d7
Farhat, Hikmat
4b7583f4-d03c-425e-a65a-82c0e157e7e6
Khaldi, Khaldoun
5dcf4cef-62d1-4bc9-95a2-ceb2e0377649
Challita, Khalil, Farhat, Hikmat and Khaldi, Khaldoun
(2010)
Biometric authentication for intrusion detection systems.
In Proceedings - 1st International Conference on Integrated Intelligent Computing, ICIIC 2010.
.
(doi:10.1109/ICIIC.2010.15).
Record type:
Conference or Workshop Item
(Paper)
Abstract
Most of the currently available intrusion detection systems do not provide any authentication functionality in order to identify the users who access a computer system. In particular, insiders are able to misuse their privileges without being detected. Some intrusion detection systems aim to authenticate legitimate users once they log in to the system, as well as to prevent access to unauthorized people who try to impersonate other users. The main goal of this paper is to introduce and implement a novel approach that uses the fingerprint technique to complement a host-based intrusion detection system in order to improve its level of authentication, which would allow us to detect more effectively any misuse of the computer system that is running it.
This record has no associated files available for download.
More information
Published date: 5 August 2010
Venue - Dates:
1st International Conference on Integrated Intelligent Computing, ICIIC 2010, , Bangalore, India, 2010-08-05 - 2010-08-07
Identifiers
Local EPrints ID: 492301
URI: http://eprints.soton.ac.uk/id/eprint/492301
PURE UUID: 115daefd-5e46-4b55-911b-6a191921b6c4
Catalogue record
Date deposited: 23 Jul 2024 17:12
Last modified: 24 Jul 2024 02:06
Export record
Altmetrics
Contributors
Author:
Khalil Challita
Author:
Hikmat Farhat
Author:
Khaldoun Khaldi
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics