Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/400114
Title: Metaheuristic Algorithm based Anomaly Detection Using Behavioral Analysis
Researcher: Priya C. V.
Guide(s): Angel Viji K.S
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Noorul Islam Centre for Higher Education
Completed Date: 2020
Abstract: Computer Security is a vast field of computer science that employs different methods to ensure data and system safety. Intrusion Detection System (IDS) is one of the common mechanisms employed for the same. It is a software tool that can detect unauthorized access to a network or computer system. Anomaly detection is one of the analysis and detection algorithm used in IDS. Behavioral biometrics is a field of study that measures the uniquely identifiable and measurable patterns in human activities. Keystroke Dynamics (KD) is a behavioral biometric verification method. Based on the manner and rhythm of typing on a keyboard, this automated keystroke dynamics method confirms or identifies the identity of an individual. When a user is typing on a keyboard, the detailed timing information is captured. This information exactly describes when a key is pressed and when it was released by the user. Keystroke dynamics is also known as keystroke biometrics or typing dynamics. For future authentication, a user s unique biometric template is developed by measuring the speed of typing, keystroke rhythms and the typing pattern on a keyboard. It helps in discriminating users and thereby helps in identifying imposters (both insiders and external attackers). With keystroke dynamics, imposters attempt to authenticate using a compromised password could be detected and rejected because their typing rhythms differ significantly from those of genuine user. newlineThis thesis proposes a metaheuristic algorithm based anomaly detection using behavioral analysis. A methodology for authenticating the legal users based on the Keystroke Dynamics using a Multilayer Perceptron Neural Network (MLP-NN) and Most Valuable Player Algorithm (MVPA). In a password-based authentication system, when the password and username match with the system database, the secure application allows the user to access it. In addition to the password matching, the Keystroke Dynamics based Authentication (KDA) system validates the user by their typing rhythm of the password
Pagination: 2191kb
URI: http://hdl.handle.net/10603/400114
Appears in Departments:Department of Computer Science and Engineering

Files in This Item:
File Description SizeFormat 
80_recommendation.pdfAttached File100.75 kBAdobe PDFView/Open
abstract.pdf61.03 kBAdobe PDFView/Open
acknowledgement.pdf5.59 kBAdobe PDFView/Open
certificate - research scholar.pdf83.14 kBAdobe PDFView/Open
certificate - supervisor.pdf83.31 kBAdobe PDFView/Open
chapter 1.pdf572.42 kBAdobe PDFView/Open
chapter 2.pdf430.22 kBAdobe PDFView/Open
chapter 3.pdf155.93 kBAdobe PDFView/Open
chapter 4.pdf310.61 kBAdobe PDFView/Open
chapter 5.pdf435.71 kBAdobe PDFView/Open
chapter 6.pdf510.42 kBAdobe PDFView/Open
chapter 7.pdf474.15 kBAdobe PDFView/Open
chapter 8.pdf36.56 kBAdobe PDFView/Open
front page.pdf80.32 kBAdobe PDFView/Open
list of publications based on thesis.pdf69.09 kBAdobe PDFView/Open
references.pdf225.7 kBAdobe PDFView/Open
table of contents.pdf29.98 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: