Selected article for: "analysis software and real time"

Author: Nowak, Jakub; Holotyak, Taras; Korytkowski, Marcin; Scherer, Rafał; Voloshynovskiy, Slava
Title: Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
  • Cord-id: 185hde7j
  • Document date: 2020_5_23
  • ID: 185hde7j
    Snippet: Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. The proposed method copes with extensive data from many
    Document: Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. The proposed method copes with extensive data from many users and allows to add new users in the future. Moreover, the system works in a real-time manner, and the proposed deep learning framework can use other user behaviour- and software interaction-related features.

    Search related documents:
    Co phrase search for related documents
    • accuracy affect and loss function: 1, 2
    • accuracy improve and loss function: 1, 2, 3, 4
    • accuracy show and loss function: 1, 2, 3, 4