Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
A Synthetic Fraud Data Generation Methodology
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Synthesizing Test Data for Fraud Detection Systems
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Generating Representative Traffic for Intrusion Detection System Benchmarking
CNSR '05 Proceedings of the 3rd Annual Communication Networks and Services Research Conference
Guidelines for Appropriate Use of Simulated Data for Bio-Authentication Research
AUTOID '05 Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies
USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
Mimicry Attack on Strategy-Based Behavioral Biometric
ITNG '08 Proceedings of the Fifth International Conference on Information Technology: New Generations
Enhanced homeland security and disaster emergency operations based on biometrics and RFID
International Journal of Computer Applications in Technology
Hi-index | 0.00 |
Behavioural intrusion detection is a frequently used for insuring network security. We expand behaviour based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a behavioural biometric signature can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioural profiles for each player in a game of Poker. Once a behavioural signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behaviour are reported to the game server administrator as potential security breaches.