cp1029的博客

3

2010-11-05 17:03:14



Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique ScienceDaily (Nov. 1, 2010) — One of the serious threats to a user\'s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone\'s identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by "organized malicious botnets," said Daphne Yao, assistant professor of computer science at Virginia Tech. To combat the "spoofing attacks," Yao and her former student, Deian Stefan, now a graduate student in the computer science department at Stanford University, developed an authentication framework called "Telling Human and Bot Apart" (TUBA), a remote biometrics system based on keystroke-dynamics information. Their work won a best paper award at CollaborateCom \'10, the 6th International Conference on Collaborative Computing, held in Chicago and sponsored by the Institute of Electrical and Electronic Engineers\' Computer Society, Create-Net, and the Institute for Computer Sciences. Yao holds a patent on her human-behavior driven malware detection technology, including this keystroke anti-spoofing technique. Her technology for PC security is currently being transferred to a company. The license agreement between the company, Rutgers University (Yao\'s former institution), and Virginia Tech is expected to be finalized in the coming weeks. 同步闪太阳能道钉 blackberry housing 不锈钢水箱 热泵工程 一体式太阳能路灯 Internet bots are often described as web robots. They act as software applications that run automated tasks over the internet. Bots usually perform simple and repetitive tasks, but at a much higher rate than would be possible for a human alone. When used for malicious purposes they are described as malware. "Keystroke dynamics is an inexpensive biometric mechanism that has been proven accurate in distinguishing individuals," Yao explained, and most researchers working with keystroke dynamics have focused previously on an attacker being a person. The uniqueness of Yao and Stefan\'s research is they studied how to identify when a computer program designed by a hacker was producing keystroke sequences "in order to spoof others," they said. Then they created TUBA to monitor a user\'s typing patterns. Using TUBA, Yao and Stefan tested the keystroke dynamics of 20 individuals, and used the results as a way to authenticate who might be using a computer. "Our work shows that keystroke dynamics is robust against the synthetic forgery attacks studied, where the attacker draws statistical samples from a pool of available keystroke datasets other than the target," Yao said. Yao and Stefan also describe in their paper, "Keystroke-Dynamics Authentication Against Synthetic Forgeries," how keystroke dynamics can be used "as a tool to identify anomalous activities on a personal computer including activities that can be due to malicious software." Ads by Google -------------------------------------------------------------------------------- Computer Career Zero to Hero in 3 Months, Hands-on Training & Certification,Affordable www?.koenig-solutions?.comMorphoTrak Biometrics MorphoTrak has a complete portfolio of biometric identification systems www?.?Morpho?Trak?.comMethode User Interfaces Simple touch-activated controls to complex multi-function consoles methode?.com?/user-interface?.htmlbiometric products finder fingerprint reader, access control, scanner, face recognition and more www?.biometrics-fingerprint?.infoRelated Stories -------------------------------------------------------------------------------- JitterBugs Could Turn Your Computer Keyboard Against You, Warn Engineers (Aug. 7, 2006) — Engineers from the University of Pennsylvania warn against an entirely new threat to computer security: bugs implanted in peripheral devices, such as keyboards or mice. This new class of devices ... > read more Hackers at the Movies (Feb. 8, 2010) — Researchers in Ireland have analyzed 50 non-documentary movies from the last four decades featuring hackers and come to some intriguing conclusions about the hacker stereotype with implications for ... > read more New Guidelines For Organization-Wide Password Management (Apr. 23, 2009) — When an employee has so many complex passwords to remember that he keeps them on a sticky note attached to his computer screen, that could be a sign that your organization needs a wiser policy for ... > read more New Research Offers Security for Virtualization, Cloud Computing (May 3, 2010) — Virtualization and cloud computing allow computer users access to powerful computers and software applications hosted by remote groups of servers, but security concerns related to data privacy are ... > read more New Spam Targeting Facebook Users Is Invisible to Most Virus Scans, Says Expert (Mar. 22, 2010) — Cyber-criminals are using fake e-mails to target Facebook users and deliver computer viruses that were being detected only by one-third of the 42 most common anti-virus products as of 12 noon March ... > read more Ads by Google ------------------------Easy 2 Button Control 2GB Sun Glasses Spy Camera M600 Quad Band Dual Cards with Java Touch Screen Cell Phone cheap phones for sale Airphone NO.4 Quad Band Dual Cards with Wifi Java Touch Screen Cell Phone Armani Collezioni Black 2 buttons men\'s suit USB MINI Fridge C66 Color 6 Inch E-Book Reader HDMI 1080P PMP 800 x 480 MP4 Ultra Thin White I68-A(I9-3G) Quad Band Dual Card With Java Bluetooth Unlocked Phone 8mm Grooved Tungsten Ring Lucky Jewelry 10.2-inch Flip-Down Car Monitor/DVD/Game dual sim card adapter for iphone 3g/3gs Networking 1201 KEDE Square Style Couple Watch (Black) WIFI M001 Dual Card Quad Band Dual Carema Flashlight WIFI TV JAVA Flat Touch Screen Phone Grey and Brown (2GB TF Card) TV HB778 Quad Band Dual Card With Bluetooth unlocked Cell Phone Cooling Pad Jabra BT3030 Stereo Haedset china tablet pc wifi gps tv 4mm Grooved Tungsten Ring Lord Rings 4GB MP3 Watch Support FM Armani collezioni sky blue twill shirt XinTai T95 Dual Cards Quad Band TV FM Cell Phone Black Hugo Boss Black 2 buttons men\'s suit 10mm Grooved Tungsten Ring Fine Jewelry Hermes penguin motif brown silk men\'s tie Shell inlaid Ceramic Wedding rings airphone 2GB Pinhole Lens Lighter Spy Camera with Color Video and Audio Super Mini Digital Hidden Camera with Motion Detection Shadow Control 1lots 5 PCS Blackbox 500s digital satellite receiver -------------------------------------------------------- Face Recognition API Detect Faces and Facial Features Enable Face Processing in Your Apps www?.?Luxand?.com?/?Face?S?D?KArtificial Intelligence Predict What Comes Next Imagine talking to your computer www?.existor?.com

请使用以下网址来引用本篇文章:

http://oson.ca/trackback.php?e=1589

   

作者 留言
这篇文章没有任何回响。
从以前的帖子开始显示:   

北美枫 首页 -> 博客群 -> cp1029的博客 -> 3