This research and development activity addresses aspects of a potential capability to detect credential misuse and a suggested alerting approach based on known attack conditions to support automated mitigation techniques. The research is based on the assumption that the audit data and human-computer activity characteristics extracted from networked components contain the footprint(s) of those trying to breach network security. It takes advantage of the combination of near-real-time suspicious activity detection with biometric behavior profiling to reduce profiling false positives and network access controls that enable faster and more focused responses to detected suspicious activities. © 2012 IEEE.
CITATION STYLE
Gabrielson, B. (2012). Who really did it? Controlling malicious insiders by merging biometric behavior with detection and automated responses. In Proceedings of the Annual Hawaii International Conference on System Sciences (pp. 2441–2449). IEEE Computer Society. https://doi.org/10.1109/HICSS.2012.643
Mendeley helps you to discover research relevant for your work.