Authentication graphs: Analyzing user behavior within an enterprise network
نویسندگان
چکیده
منابع مشابه
User Authentication from Web Browsing Behavior
As anticipated in True Names by Vernor Vinge, identity has been recognized as our most valued possession in cyberspace. Attribution is a key concept in enabling trusted identities and deterring malicious activities. As more people use the Web to communicate, work, and otherwise have fun, is it possible to uniquely identify someone based on their Web browsing behavior or to differentiate between...
متن کاملImplicit Authentication through Learning User Behavior
Users are increasingly dependent on mobile devices. However, current authentication methods like password entry are significantly more frustrating and difficult to perform on these devices, leading users to create and reuse shorter passwords and pins, or no authentication at all. We present implicit authentication authenticating users based on behavior patterns. We describe our model for perfor...
متن کاملAnalyzing User Behavior to Rank Desktop Items
Existing desktop search applications, trying to keep up with the rapidly increasing storage capacities of our hard disks, are an important step towards more efficient personal information management, yet they offer an incomplete solution. While their indexing functionalities in terms of different file types they are able to cope with are impressive, their ranking capabilities are basic, and rel...
متن کاملAnalyzing Sequential User Behavior on the Web
This tutorial aims at outlining fundamental methods for studying categorical sequences on the Web. Categorical sequences can refer to any kind of transitional data between a set of states, for example human navigation (transitions) between Web sites (states). Presented methods focus on sequential pattern mining, modeling and inference aiming at better understanding the production of sequences. ...
متن کاملCoordination by Hierarchical Negotiation within an Enterprise Network
Organization of a project within an Enterprise network raises several key issues in terms of decision and execution control. The distributed nature of the network requires a high level of autonomy in taking decisions and executing tasks, while operational efficiency calls for an optimal use of human and physical resources, and for efficient coordination mechanisms. The different business units ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2015
ISSN: 0167-4048
DOI: 10.1016/j.cose.2014.09.001