Some of The Parameters Used To Identify A Person
- Keystroke Dynamics (aka keystroke patterns, typing pattern, typing behaviour)
- Patterns using an interactive command interpreter:
- Commands used
- Commands sequence
- Accessed directories
- Character deletion
- Patterns on the network usage:
- IP address used
- ISP
- Country
- City
- Ports used
- TTL analysis
- Operating system used to attack
- Protocols used
- Connection times patterns
- IP address used
Read more about this topic: Intruder Detection
Famous quotes containing the words parameters, identify and/or person:
“What our children have to fear is not the cars on the highways of tomorrow but our own pleasure in calculating the most elegant parameters of their deaths.”
—J.G. (James Graham)
“When committees gather, each member is necessarily an actor, uncontrollably acting out the part of himself, reading the lines that identify him, asserting his identity.... We are designed, coded, it seems, to place the highest priority on being individuals, and we must do this first, at whatever cost, even if it means disability for the group.”
—Lewis Thomas (b. 1913)
“Thus did I keep my person fresh and new,
My presence, like a robe pontifical,
Neer seen but wondered at, and so my state,
Seldom but sumptuous, showed like a feast.”
—William Shakespeare (15641616)