Reference Hub2
A Novel Software System Protection Scheme Based on Behavior and Context Monitoring

A Novel Software System Protection Scheme Based on Behavior and Context Monitoring

Shen Fu, Mathew L. Wymore, Ting-Wei Chang, Daji Qiao
Copyright: © 2019 |Volume: 10 |Issue: 1 |Pages: 25
EISBN13: 9781522566687|ISSN: 2640-4265|EISSN: 2640-4273|DOI: 10.4018/IJSSSP.2019010102
Cite Article Cite Article

MLA

Fu, Shen, et al. "A Novel Software System Protection Scheme Based on Behavior and Context Monitoring." IJSSSP vol.10, no.1 2019: pp.22-46. http://doi.org/10.4018/IJSSSP.2019010102

APA

Fu, S., Wymore, M. L., Chang, T., & Qiao, D. (2019). A Novel Software System Protection Scheme Based on Behavior and Context Monitoring. International Journal of Systems and Software Security and Protection (IJSSSP), 10(1), 22-46. http://doi.org/10.4018/IJSSSP.2019010102

Chicago

Fu, Shen, et al. "A Novel Software System Protection Scheme Based on Behavior and Context Monitoring," International Journal of Systems and Software Security and Protection (IJSSSP) 10, no.1: 22-46. http://doi.org/10.4018/IJSSSP.2019010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The restriction of access to software systems is more important than ever. Yet, most primary authentication methods are still largely based on passwords, which are vulnerable to various attacks such as phishing scams and keyloggers. Advanced methods of behavior-based authentication exist, but most are platform-specific and are not generally applicable. In this article, the authors propose a generic continuous authentication scheme for software systems, which supplements existing authentication schemes and works as an auxiliary layer to provide additional protection against impostors. The kernel of their scheme is a novel monitoring engine that detects impostors in real-time based on behavior and context information. The authors evaluate their scheme on a dataset consisting of real users' historical records provided by their industrial partner, and the results demonstrate that the approach achieves a high classification accuracy with only a short delay in detection, allowing for real-time, continuous authentication.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.