Cargando…

Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns

Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that n...

Descripción completa

Detalles Bibliográficos
Autores principales: Nowak, Jakub, Holotyak, Taras, Korytkowski, Marcin, Scherer, Rafał, Voloshynovskiy, Slava
Formato: Online Artículo Texto
Lenguaje:English
Publicado: 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7303709/
http://dx.doi.org/10.1007/978-3-030-50423-6_14
_version_ 1783548118514532352
author Nowak, Jakub
Holotyak, Taras
Korytkowski, Marcin
Scherer, Rafał
Voloshynovskiy, Slava
author_facet Nowak, Jakub
Holotyak, Taras
Korytkowski, Marcin
Scherer, Rafał
Voloshynovskiy, Slava
author_sort Nowak, Jakub
collection PubMed
description Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. The proposed method copes with extensive data from many users and allows to add new users in the future. Moreover, the system works in a real-time manner, and the proposed deep learning framework can use other user behaviour- and software interaction-related features.
format Online
Article
Text
id pubmed-7303709
institution National Center for Biotechnology Information
language English
publishDate 2020
record_format MEDLINE/PubMed
spelling pubmed-73037092020-06-19 Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns Nowak, Jakub Holotyak, Taras Korytkowski, Marcin Scherer, Rafał Voloshynovskiy, Slava Computational Science – ICCS 2020 Article Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. The proposed method copes with extensive data from many users and allows to add new users in the future. Moreover, the system works in a real-time manner, and the proposed deep learning framework can use other user behaviour- and software interaction-related features. 2020-05-23 /pmc/articles/PMC7303709/ http://dx.doi.org/10.1007/978-3-030-50423-6_14 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic.
spellingShingle Article
Nowak, Jakub
Holotyak, Taras
Korytkowski, Marcin
Scherer, Rafał
Voloshynovskiy, Slava
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
title Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
title_full Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
title_fullStr Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
title_full_unstemmed Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
title_short Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
title_sort fingerprinting of url logs: continuous user authentication from behavioural patterns
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7303709/
http://dx.doi.org/10.1007/978-3-030-50423-6_14
work_keys_str_mv AT nowakjakub fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns
AT holotyaktaras fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns
AT korytkowskimarcin fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns
AT schererrafał fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns
AT voloshynovskiyslava fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns