IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Keystroke Analysis as a Tool for Intrusion Detection

Keystroke Analysis as a Tool for Intrusion Detection
View Sample PDF
Author(s): Daniele Gunetti (University of Torino, Italy)and Claudia Picardi (University of Torino, Italy)
Copyright: 2012
Pages: 19
Source title: Continuous Authentication Using Biometrics: Data, Models, and Metrics
Source Author(s)/Editor(s): Issa Traore (University of Victoria, Canada)and Ahmed Awad E. Ahmed (University of Victoria, Canada)
DOI: 10.4018/978-1-61350-129-0.ch009

Purchase

View Keystroke Analysis as a Tool for Intrusion Detection on the publisher's website for pricing and purchasing information.

Abstract

In this chapter we discuss the potentialities of Keystroke Analysis as a tool for Intrusion Detection and other security applications, and investigate experimentally how the accuracy of the analysis scales with the increase of the number of individuals involved, a fundamental issue if we want to add Keystroke Analysis to the set of tools that can be used to improve the security of our computers and networks.

Related Content

Ajay Rawat, Shivani Gambhir. © 2017. 19 pages.
Abhijit Chandra, Srideep Maity. © 2017. 15 pages.
Swanirbhar Majumder, Saurabh Pal. © 2017. 26 pages.
Fouad Farouk Jabri. © 2017. 32 pages.
Francisco Pacheco Andrade, Teresa Coelho Moreira. © 2017. 13 pages.
Swanirbhar Majumder, Smita Majumder. © 2017. 31 pages.
Yuanfang Guo, Oscar C. Au, Ketan Tang. © 2017. 20 pages.
Body Bottom