fbpx
Wikipedia

Intruder detection

In information security, intruder detection is the process of detecting intruders behind attacks as unique persons. This technique tries to identify the person behind an attack by analyzing their computational behaviour. This concept is sometimes confused with Intrusion Detection (also known as IDS) techniques which are the art of detecting intruder actions.

History edit

Some other earlier works reference the concept of Intruder Authentication, Intruder Verification, or Intruder Classification, but the Si6 project was one of the first projects to deal with the full scope of the concept.

Theory edit

Intruder Detection Systems try to detect who is attacking a system by analyzing his or her computational behaviour or biometric behaviour.

Some of the parameters used to identify a intruder edit

  • Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
  • Patterns using an interactive command interpreter:
    • Commands used
    • Commands sequence
    • Accessed directories
    • Character deletion
  • Patterns on the network usage:
    • IP address used
      • ISP
      • Country
      • City
    • Ports used
    • TTL analysis
    • Operating system used to attack
    • Protocols used
    • Connection times patterns

Keystroke dynamics edit

Keystroke dynamics is paramount in Intruder Detection techniques because it is the only parameter that has been classified as a real 'behavioural biometric pattern'.

Keystroke dynamics analyze times between keystrokes issued in a computer keyboard or cellular phone keypad searching for patterns. First techniques used statistics and probability concepts like 'standard deviations' and 'Mean', later approaches use data mining, neural networks, Support Vector Machine, etc.

Translation confusion edit

There is a confusion with the Spanish translation of 'Intrusion detection system', also known as IDS. Some people translate it as 'Sistemas de Detección de Intrusiones', but others translate it as 'Sistemas de Detección de Intrusos'[citation needed]. Only the former is correct.

See also edit

External links edit

  • P0f OS fingerprinting tool
  • Si6 Paranoid Project

intruder, detection, this, article, does, cite, sources, please, help, improve, this, article, adding, citations, reliable, sources, unsourced, material, challenged, removed, find, sources, news, newspapers, books, scholar, jstor, march, 2009, learn, when, rem. This article does not cite any sources Please help improve this article by adding citations to reliable sources Unsourced material may be challenged and removed Find sources Intruder detection news newspapers books scholar JSTOR March 2009 Learn how and when to remove this template message In information security intruder detection is the process of detecting intruders behind attacks as unique persons This technique tries to identify the person behind an attack by analyzing their computational behaviour This concept is sometimes confused with Intrusion Detection also known as IDS techniques which are the art of detecting intruder actions Contents 1 History 2 Theory 2 1 Some of the parameters used to identify a intruder 2 2 Keystroke dynamics 3 Translation confusion 4 See also 5 External linksHistory editSome other earlier works reference the concept of Intruder Authentication Intruder Verification or Intruder Classification but the Si6 project was one of the first projects to deal with the full scope of the concept Theory editIntruder Detection Systems try to detect who is attacking a system by analyzing his or her computational behaviour or biometric behaviour Some of the parameters used to identify a intruder edit Keystroke Dynamics aka keystroke patterns typing pattern typing behaviour Patterns using an interactive command interpreter Commands used Commands sequence Accessed directories Character deletion Patterns on the network usage IP address used ISP Country City Ports used TTL analysis Operating system used to attack Protocols used Connection times patternsKeystroke dynamics edit Keystroke dynamics is paramount in Intruder Detection techniques because it is the only parameter that has been classified as a real behavioural biometric pattern Keystroke dynamics analyze times between keystrokes issued in a computer keyboard or cellular phone keypad searching for patterns First techniques used statistics and probability concepts like standard deviations and Mean later approaches use data mining neural networks Support Vector Machine etc Translation confusion editThere is a confusion with the Spanish translation of Intrusion detection system also known as IDS Some people translate it as Sistemas de Deteccion de Intrusiones but others translate it as Sistemas de Deteccion de Intrusos citation needed Only the former is correct See also editIntrusion Detection Intrusion detection system BiometricsExternal links editP0f OS fingerprinting tool Si6 Paranoid Project Retrieved from https en wikipedia org w index php title Intruder detection amp oldid 954621925, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.