Intruder Detection - Some of The Parameters Used To Identify A Person

Some of The Parameters Used To Identify A Person

  • Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
  • Patterns using an interactive command interpreter:
    • Commands used
    • Commands sequence
    • Accessed directories
    • Character deletion
  • Patterns on the network usage:
    • IP address used
      • ISP
      • Country
      • City
    • Ports used
    • TTL analysis
    • Operating system used to attack
    • Protocols used
    • Connection times patterns

Read more about this topic:  Intruder Detection

Famous quotes containing the words parameters, identify and/or person:

    What our children have to fear is not the cars on the highways of tomorrow but our own pleasure in calculating the most elegant parameters of their deaths.
    —J.G. (James Graham)

    The Louvre is like the morgue; one goes there to identify one’s friends.
    Jean Cocteau (1889–1963)

    If people must be talking about me, I would have it to be truthfully and justly. I would willingly return from the next world to contradict any person who described me other than I was, although he did it to honour me.
    Michel de Montaigne (1533–1592)