2 research outputs found

    Profiling Users by Modeling Web Transactions

    Full text link
    Users of electronic devices, e.g., laptop, smartphone, etc. have characteristic behaviors while surfing the Web. Profiling this behavior can help identify the person using a given device. In this paper, we introduce a technique to profile users based on their web transactions. We compute several features extracted from a sequence of web transactions and use them with one-class classification techniques to profile a user. We assess the efficacy and speed of our method at differentiating 25 users on a dataset representing 6 months of web traffic monitoring from a small company network.Comment: Extended technical report of an IEEE ICDCS 2017 publicatio

    Automated Deauthentication using Web Transaction Analysis

    No full text
    Companies commonly provide work related devices enabled with Internet connection to their employees. Usually, all the company's incoming and outgoing Internet traffic is checked by some protection system, eg. by a firewall. Commonly deployed protection systems use static rules that ``allow'' or ``block'' the traffic. However, these rules can not detect changes in user behaviors. Modeling user behavior may be beneficial if it is sufficiently unique with respect to activities of other users or attackers. An automated deauthentication system that is able to recognize if behavior of an active user corresponds to the behavior of an authorized and expected user is proposed in the thesis. The system can recognize an innocent attacker in more than 50\% cases and a legitimate user in more than 95\% cases. The system is expected to work together with other authentication systems
    corecore