Some of The Parameters Used To Identify A Person
- Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
- Patterns using an interactive command interpreter:
- Commands used
- Commands sequence
- Accessed directories
- Character deletion
- Patterns on the network usage:
- IP address used
- ISP
- Country
- City
- Ports used
- TTL analysis
- Operating system used to attack
- Protocols used
- Connection times patterns
- IP address used
Read more about this topic: Intruder Detection
Famous quotes containing the words parameters, identify and/or person:
“Men have defined the parameters of every subject. All feminist arguments, however radical in intent or consequence, are with or against assertions or premises implicit in the male system, which is made credible or authentic by the power of men to name.”
—Andrea Dworkin (b. 1946)
“The Louvre is like the morgue; one goes there to identify ones friends.”
—Jean Cocteau (18891963)
“It used to be said that, socially speaking, Philadelphia asked who a person is, New York how much is he worth, and Boston what does he know. Nationally it has now become generally recognized that Boston Society has long cared even more than Philadelphia about the first point and has refined the asking of who a person is to the point of demanding to know who he was. Philadelphia asks about a mans parents; Boston wants to know about his grandparents.”
—Cleveland Amory (b. 1917)