Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/400114
Title: | Metaheuristic Algorithm based Anomaly Detection Using Behavioral Analysis |
Researcher: | Priya C. V. |
Guide(s): | Angel Viji K.S |
Keywords: | Computer Science Computer Science Information Systems Engineering and Technology |
University: | Noorul Islam Centre for Higher Education |
Completed Date: | 2020 |
Abstract: | Computer Security is a vast field of computer science that employs different methods to ensure data and system safety. Intrusion Detection System (IDS) is one of the common mechanisms employed for the same. It is a software tool that can detect unauthorized access to a network or computer system. Anomaly detection is one of the analysis and detection algorithm used in IDS. Behavioral biometrics is a field of study that measures the uniquely identifiable and measurable patterns in human activities. Keystroke Dynamics (KD) is a behavioral biometric verification method. Based on the manner and rhythm of typing on a keyboard, this automated keystroke dynamics method confirms or identifies the identity of an individual. When a user is typing on a keyboard, the detailed timing information is captured. This information exactly describes when a key is pressed and when it was released by the user. Keystroke dynamics is also known as keystroke biometrics or typing dynamics. For future authentication, a user s unique biometric template is developed by measuring the speed of typing, keystroke rhythms and the typing pattern on a keyboard. It helps in discriminating users and thereby helps in identifying imposters (both insiders and external attackers). With keystroke dynamics, imposters attempt to authenticate using a compromised password could be detected and rejected because their typing rhythms differ significantly from those of genuine user. newlineThis thesis proposes a metaheuristic algorithm based anomaly detection using behavioral analysis. A methodology for authenticating the legal users based on the Keystroke Dynamics using a Multilayer Perceptron Neural Network (MLP-NN) and Most Valuable Player Algorithm (MVPA). In a password-based authentication system, when the password and username match with the system database, the secure application allows the user to access it. In addition to the password matching, the Keystroke Dynamics based Authentication (KDA) system validates the user by their typing rhythm of the password |
Pagination: | 2191kb |
URI: | http://hdl.handle.net/10603/400114 |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
80_recommendation.pdf | Attached File | 100.75 kB | Adobe PDF | View/Open |
abstract.pdf | 61.03 kB | Adobe PDF | View/Open | |
acknowledgement.pdf | 5.59 kB | Adobe PDF | View/Open | |
certificate - research scholar.pdf | 83.14 kB | Adobe PDF | View/Open | |
certificate - supervisor.pdf | 83.31 kB | Adobe PDF | View/Open | |
chapter 1.pdf | 572.42 kB | Adobe PDF | View/Open | |
chapter 2.pdf | 430.22 kB | Adobe PDF | View/Open | |
chapter 3.pdf | 155.93 kB | Adobe PDF | View/Open | |
chapter 4.pdf | 310.61 kB | Adobe PDF | View/Open | |
chapter 5.pdf | 435.71 kB | Adobe PDF | View/Open | |
chapter 6.pdf | 510.42 kB | Adobe PDF | View/Open | |
chapter 7.pdf | 474.15 kB | Adobe PDF | View/Open | |
chapter 8.pdf | 36.56 kB | Adobe PDF | View/Open | |
front page.pdf | 80.32 kB | Adobe PDF | View/Open | |
list of publications based on thesis.pdf | 69.09 kB | Adobe PDF | View/Open | |
references.pdf | 225.7 kB | Adobe PDF | View/Open | |
table of contents.pdf | 29.98 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: