Prevention or Identification of Web Intrusion via Human Computer Interaction Behaviour – A Proposal

نویسندگان

  • Hugo Gamboa
  • Ana Fred
  • António Alves Vieira
چکیده

The present work proposes a new technique for the identification or prevention of intrusion in web applications via the monitoring of the user interaction behaviour. We report preliminary results in a verification task based on a user claiming his identity and being accepted or detected as an intruder after some time of user interaction monitoring. We describe the acquisition system that enables the remote monitoring of the user human computer interaction and the recognition system that detects an intrusion in the system, and present some preliminary results. 1.0 INTRODUCTION Malicious intrusion in Internet sites either with the intention of disrupting the system or to steal information can threat the normal operation of the Web. We propose a new biometric technique capable of monitoring the user behaviour in a web site in order to prevent or detect intrusion by validating the user identity claim, normally made in a logon page. The system is based on the learnt human computer interaction behaviour of the genuine users. We developed an acquisition system, called Web Interaction Display and Monitoring (WIDAM) [3] , that collects the user interaction data by recording the mouse movements, clicks and key presses, among other interaction events, while the user is browsing a web page. The biometric system uses this last system to verify the identity of a, while he is navigating in the web page. The classification is based on statistical pattern recognition models, and is done after a period of interaction. This period can be selected in order to define the security level of the biometric system. In our preliminary results we obtained a level of security similar to other behavioural biometrics techniques if a period of 60 seconds of interaction is collected. This methodology introduces a possibility of applying an biometric layer to web systems with the present technology. We will now introduce some terminology used in the biometric area. Biometric systems can be divided in two types [7]: (1) Identity verification (or authentication) occurs when a user claims who he is and the system accepts (or declines) his claim; (2) Identity identification (sometimes called search) occurs when the system establishes a subject identity (or fails to do it) without any prior claim. Biometric techniques can also be classified according to the type of characteristics explored : (1) physiological --a physiological trait tends to be a stable physical characteristic, such as Paper presented at the RTO SCI Symposium on “Systems, Concepts and Integration (SCI) Methods and Technologies for Defence Against Terrorism,” held in London, United Kingdom, 25-27 October 2004, and published in RTO-MP-SCI-158.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating Dynamic Writing Assessment in a Web 2.0 Asynchronous Collaborative Computer-Mediated Context

This study aims at investigating the effect of dynamic assessment (DA) on L2 writing achievement if applied via blogging as a Web 2.0 tool, as well as examining which pattern of interaction is more conducive to learning in such an environment. The results of the study indicate that using weblogs to provide mediation contributes to the enhancement of the overall writing performance, vocabulary a...

متن کامل

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Behavioral Considerations in Developing Web Information Systems: User-centered Design Agenda

The current paper explores designing a web information retrieval system regarding the searching behavior of users in real and everyday life. Designing an information system that is closely linked to human behavior is equally important for providers and the end users.  From an Information Science point of view, four approaches in designing information retrieval systems were identified as system-...

متن کامل

SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots

As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetBait, an automated protection system that employs lowand high-interaction honeypots to recognise and capture suspicious traffic. After discarding white-listed patterns, it automatically generates worm signatures. To pro...

متن کامل

Human-Computer Interaction and Human Mental Workload: Assessing Cognitive Engagement in the World Wide Web

Assessing the cognitive engagement of a user while seeking and consuming information over the World Wide Web is a key challenge for studying the quality of interactions. Indicators of cognitive engagement are useful for enhancing usability of interfaces, designing adaptable systems but also for analysing user behaviour and performance. For this purpose, we aim to adopt the multifaceted concept ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006