Cargando…
Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns
Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that n...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7303709/ http://dx.doi.org/10.1007/978-3-030-50423-6_14 |
_version_ | 1783548118514532352 |
---|---|
author | Nowak, Jakub Holotyak, Taras Korytkowski, Marcin Scherer, Rafał Voloshynovskiy, Slava |
author_facet | Nowak, Jakub Holotyak, Taras Korytkowski, Marcin Scherer, Rafał Voloshynovskiy, Slava |
author_sort | Nowak, Jakub |
collection | PubMed |
description | Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. The proposed method copes with extensive data from many users and allows to add new users in the future. Moreover, the system works in a real-time manner, and the proposed deep learning framework can use other user behaviour- and software interaction-related features. |
format | Online Article Text |
id | pubmed-7303709 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
record_format | MEDLINE/PubMed |
spelling | pubmed-73037092020-06-19 Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns Nowak, Jakub Holotyak, Taras Korytkowski, Marcin Scherer, Rafał Voloshynovskiy, Slava Computational Science – ICCS 2020 Article Security of computer systems is now a critical and evolving issue. Current trends try to use behavioural biometrics for continuous authorization. Our work is intended to strengthen network user authentication by a software interaction analysis. In our research, we use HTTP request (URLs) logs that network administrators collect. We use a set of full-convolutional autoencoders and one authentication (one-class) convolutional neural network. The proposed method copes with extensive data from many users and allows to add new users in the future. Moreover, the system works in a real-time manner, and the proposed deep learning framework can use other user behaviour- and software interaction-related features. 2020-05-23 /pmc/articles/PMC7303709/ http://dx.doi.org/10.1007/978-3-030-50423-6_14 Text en © Springer Nature Switzerland AG 2020 This article is made available via the PMC Open Access Subset for unrestricted research re-use and secondary analysis in any form or by any means with acknowledgement of the original source. These permissions are granted for the duration of the World Health Organization (WHO) declaration of COVID-19 as a global pandemic. |
spellingShingle | Article Nowak, Jakub Holotyak, Taras Korytkowski, Marcin Scherer, Rafał Voloshynovskiy, Slava Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns |
title | Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns |
title_full | Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns |
title_fullStr | Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns |
title_full_unstemmed | Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns |
title_short | Fingerprinting of URL Logs: Continuous User Authentication from Behavioural Patterns |
title_sort | fingerprinting of url logs: continuous user authentication from behavioural patterns |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7303709/ http://dx.doi.org/10.1007/978-3-030-50423-6_14 |
work_keys_str_mv | AT nowakjakub fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns AT holotyaktaras fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns AT korytkowskimarcin fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns AT schererrafał fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns AT voloshynovskiyslava fingerprintingofurllogscontinuoususerauthenticationfrombehaviouralpatterns |