Intruder Detection - Some of The Parameters Used To Identify A Person

Some of The Parameters Used To Identify A Person

  • Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
  • Patterns using an interactive command interpreter:
    • Commands used
    • Commands sequence
    • Accessed directories
    • Character deletion
  • Patterns on the network usage:
    • IP address used
      • ISP
      • Country
      • City
    • Ports used
    • TTL analysis
    • Operating system used to attack
    • Protocols used
    • Connection times patterns

Read more about this topic:  Intruder Detection

Famous quotes containing the words parameters, identify and/or person:

    What our children have to fear is not the cars on the highways of tomorrow but our own pleasure in calculating the most elegant parameters of their deaths.
    —J.G. (James Graham)

    I had been living in Berlin since 1922, thus synchronously with the young man of the book; but neither this fact, nor my sharing some of his interests, such as literature and lepidoptera, should make one say “aha” and identify the designer with the design.
    Vladimir Nabokov (1899–1977)

    There is an optical illusion about every person we meet.
    Ralph Waldo Emerson (1803–1882)