Intruder Detection - Some of The Parameters Used To Identify A Person

Some of The Parameters Used To Identify A Person

  • Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
  • Patterns using an interactive command interpreter:
    • Commands used
    • Commands sequence
    • Accessed directories
    • Character deletion
  • Patterns on the network usage:
    • IP address used
      • ISP
      • Country
      • City
    • Ports used
    • TTL analysis
    • Operating system used to attack
    • Protocols used
    • Connection times patterns

Read more about this topic:  Intruder Detection

Famous quotes containing the words parameters, identify and/or person:

    What our children have to fear is not the cars on the highways of tomorrow but our own pleasure in calculating the most elegant parameters of their deaths.
    —J.G. (James Graham)

    To care for the quarrels of the past, to identify oneself passionately with a cause that became, politically speaking, a losing cause with the birth of the modern world, is to experience a kind of straining against reality, a rebellious nonconformity that, again, is rare in America, where children are instructed in the virtues of the system they live under, as though history had achieved a happy ending in American civics.
    Mary McCarthy (1912–1989)

    Even in ordinary speech we call a person unreasonable whose outlook is narrow, who is conscious of one thing only at a time, and who is consequently the prey of his own caprice, whilst we describe a person as reasonable whose outlook is comprehensive, who is capable of looking at more than one side of a question and of grasping a number of details as parts of a whole.
    G. Dawes Hicks (1862–1941)