Intruder Detection - Some of The Parameters Used To Identify A Person

Some of The Parameters Used To Identify A Person

  • Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
  • Patterns using an interactive command interpreter:
    • Commands used
    • Commands sequence
    • Accessed directories
    • Character deletion
  • Patterns on the network usage:
    • IP address used
      • ISP
      • Country
      • City
    • Ports used
    • TTL analysis
    • Operating system used to attack
    • Protocols used
    • Connection times patterns

Read more about this topic:  Intruder Detection

Famous quotes containing the words parameters, identify and/or person:

    Men have defined the parameters of every subject. All feminist arguments, however radical in intent or consequence, are with or against assertions or premises implicit in the male system, which is made credible or authentic by the power of men to name.
    Andrea Dworkin (b. 1946)

    The Louvre is like the morgue; one goes there to identify one’s friends.
    Jean Cocteau (1889–1963)

    It used to be said that, socially speaking, Philadelphia asked who a person is, New York how much is he worth, and Boston what does he know. Nationally it has now become generally recognized that Boston Society has long cared even more than Philadelphia about the first point and has refined the asking of who a person is to the point of demanding to know who he was. Philadelphia asks about a man’s parents; Boston wants to know about his grandparents.
    Cleveland Amory (b. 1917)