A Real-Time User Authenticating Method Using Behavior Pattern Through Web
نویسندگان
چکیده
منابع مشابه
Authenticating real time packet streams and multicasts
In this work we propose a new stream authentication scheme that is suitable for live packet streams distributed over a lossy channel, such as an IP-multicast group. Packets are signed together in a block and the recipient can authenticate this block if the loss rate per block is lower than a certain threshold, which can be chosen based on the characteristic of the communication channel. This sc...
متن کاملUnderstanding User Behavior using Web Usage Mining
Web usage mining is about analyzing the user interactions with a web server based on resources like web logs, click streams and database transactions. It helps in discovering the browsing patterns of the user and in relating the pages visited by him. This knowledge can be of help in making business decisions, refining the web site design to derive personalized pages. Web usage mining uses the d...
متن کاملF-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
Distributed Denial of Service (DDoS) is a common attack in recent years that can deplete the bandwidth of victim nodes by flooding packets. Based on the type and quantity of traffic used for the attack and the exploited vulnerability of the target, DDoS attacks are grouped into three categories as Volumetric attacks, Protocol attacks and Application attacks. The volumetric attack, which the pro...
متن کاملIdentifying Web Performance Degradations through Synthetic and Real-User Monitoring
The large scale of the Internet has offered unique economic opportunities, that in turn introduce overwhelming challenges for development and operations to provide reliable and fast services in order to meet the high demands on the performance of online services. In this paper, we investigate how performance engineers can identify three different classes of externally-visible performance proble...
متن کاملInsider attack and real-time data mining of user behavior
Early detection of employees’ improper access to sensitive or valuable data is critical to limiting negative financial impacts to an organization, including regulatory penalties for misuse of customer data that results from these insider attacks. Implementing a system for detecting insider attacks is a technical challenge that also involves business-process changes and decision making that prio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Institute of Information Security and Cryptology
سال: 2016
ISSN: 1598-3986
DOI: 10.13089/jkiisc.2016.26.6.1493