This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2013 IEEE Security and Privacy Workshops
Differentiating User Authentication Graphs
San Francisco, CA, USA USA
May 23-May 24
ISBN: 978-1-4799-0458-7
Authentication using centralized methods is aprimary trust mechanism within most large-scale, enterprisecomputer networks. This paper proposes using graphs torepresent user authentication activity within the network. Usingthis mechanism over a real enterprise network dataset, we findthat non-privileged users and users with system administrationprivileges have distinguishable graph attributes in terms of sizeand complexity. In addition, we find that user authenticationgraphs provide intuitive insights into network user behavior.We believe that understanding these differences in even greaterdetail will lead to improved user behavior profiling and theelusive detection of authentication credential misuse.
Citation:
Alexander D. Kent, Lorie M. Liebrock, "Differentiating User Authentication Graphs," spw, pp.72-75, 2013 IEEE Security and Privacy Workshops, 2013
Usage of this product signifies your acceptance of the Terms of Use.