Intruder Detection by Operational Commands


According to Wikipedia, "WikiLeaks is an international, online, self-described not-for-profit organisation publishing submissions of private, secret, and classified media from anonymous news sources, news leaks, and whistleblowers." In November 2010, WikiLeaks released the content of U.S. State department diplomatic cables.

Governments worldwide would like to ensure that their secret information is not released to the public. For example, possible leaks could come from government employees finding and sending secret information out of their building.

Project Description

This will be a small 1-2 person project. This project will develop the plans and an initialprototype for an intruder detection prototype system that monitors users computer input for intruder-like operational commands.

See references, and particularly the video associated with the first reference. The second reference describes a multi-level strategy for intruder detection.

Key References

  1. Brian Tschinkel, et al., Keystroke Biometric Intrusion Detection, Proc. Research Day, CSIS, Pace University, 2012. Associated Video.
  2. John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, and Charles C. Tappert, Developing a Keystroke Biometric System for Continual Authentication of Computer Users, EISIC Conf., Denmark, 2012.