Who really did it? Controlling malicious insiders by merging biometric behavior with detection and automated responses

3Citations
Citations of this article
213Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This research and development activity addresses aspects of a potential capability to detect credential misuse and a suggested alerting approach based on known attack conditions to support automated mitigation techniques. The research is based on the assumption that the audit data and human-computer activity characteristics extracted from networked components contain the footprint(s) of those trying to breach network security. It takes advantage of the combination of near-real-time suspicious activity detection with biometric behavior profiling to reduce profiling false positives and network access controls that enable faster and more focused responses to detected suspicious activities. © 2012 IEEE.

Cite

CITATION STYLE

APA

Gabrielson, B. (2012). Who really did it? Controlling malicious insiders by merging biometric behavior with detection and automated responses. In Proceedings of the Annual Hawaii International Conference on System Sciences (pp. 2441–2449). IEEE Computer Society. https://doi.org/10.1109/HICSS.2012.643

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free