Loading…

SUP: Security User Profiles for Behavioral Data Platforms

Integrating user behavior across domains to create comprehensive profiles is crucial for system efficiency and security. This paper delves into the use of data analytics techniques to gather user data from various application domains, enabling the creation of security user profiles that contain data...

Full description

Saved in:
Bibliographic Details
Main Authors: Sulayman, Iman I. M. Abu, Ouda, Abdelkader
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 7
container_issue
container_start_page 1
container_title
container_volume
creator Sulayman, Iman I. M. Abu
Ouda, Abdelkader
description Integrating user behavior across domains to create comprehensive profiles is crucial for system efficiency and security. This paper delves into the use of data analytics techniques to gather user data from various application domains, enabling the creation of security user profiles that contain data suitable for user authentication. Specifically, these methods are capable of identifying patterns in the users' data and then using said patterns to detect legitimate but anomalous activities performed by the users. Furthermore, we propose an innovative mechanism that dynamically integrates these profiles to create a comprehensive and global security profile for user authentication. Typically, each profile represents a distinctive entity detailing infrequent user behaviors that significantly impact identity verification. The verification process involves posing user challenge questions generated from these integrated profiles. The generated user profiles ensure the selection of questions that meet both security and usability requirements. We uphold security by issuing each question from the integrated user profiles only once, protecting user responses from potential compromise. We prioritize usability by using fresh data, which helps legitimate users recall and complete the challenge easily.
doi_str_mv 10.1109/ISNCC62547.2024.10759020
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10759020</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10759020</ieee_id><sourcerecordid>10759020</sourcerecordid><originalsourceid>FETCH-ieee_primary_107590203</originalsourceid><addsrcrecordid>eNqFjs0KgkAYALcgSMo36PC9gPbtj67bMSvqEoJ5liVW2lCMXQt8-zrUudPAzGUIAYoxpajWp_Kc5ylLhIwZMhFTlIlChhMSKqkyniBPhaI4JQGTaRahEjgnofd3RORUSklZQFRZFRsozfXp7DBC5Y2DwvWNbY2HpnewNTf9sr3TLez0oKFo9fDxnV-SWaNbb8IvF2R12F_yY2SNMfXD2U67sf5d8T_5DVoJOd0</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>SUP: Security User Profiles for Behavioral Data Platforms</title><source>IEEE Xplore All Conference Series</source><creator>Sulayman, Iman I. M. Abu ; Ouda, Abdelkader</creator><creatorcontrib>Sulayman, Iman I. M. Abu ; Ouda, Abdelkader</creatorcontrib><description>Integrating user behavior across domains to create comprehensive profiles is crucial for system efficiency and security. This paper delves into the use of data analytics techniques to gather user data from various application domains, enabling the creation of security user profiles that contain data suitable for user authentication. Specifically, these methods are capable of identifying patterns in the users' data and then using said patterns to detect legitimate but anomalous activities performed by the users. Furthermore, we propose an innovative mechanism that dynamically integrates these profiles to create a comprehensive and global security profile for user authentication. Typically, each profile represents a distinctive entity detailing infrequent user behaviors that significantly impact identity verification. The verification process involves posing user challenge questions generated from these integrated profiles. The generated user profiles ensure the selection of questions that meet both security and usability requirements. We uphold security by issuing each question from the integrated user profiles only once, protecting user responses from potential compromise. We prioritize usability by using fresh data, which helps legitimate users recall and complete the challenge easily.</description><identifier>EISSN: 2768-0940</identifier><identifier>EISBN: 9798350364910</identifier><identifier>DOI: 10.1109/ISNCC62547.2024.10759020</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Authentication ; Behavioral data analytics ; Behavioral modeling ; Computational modeling ; Computers ; Data analysis ; Data models ; Focusing ; Information security ; Security ; Usability ; User profile</subject><ispartof>International Symposium on Networks, Computers and Communications, 2024, p.1-7</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10759020$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10759020$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sulayman, Iman I. M. Abu</creatorcontrib><creatorcontrib>Ouda, Abdelkader</creatorcontrib><title>SUP: Security User Profiles for Behavioral Data Platforms</title><title>International Symposium on Networks, Computers and Communications</title><addtitle>ISNCC</addtitle><description>Integrating user behavior across domains to create comprehensive profiles is crucial for system efficiency and security. This paper delves into the use of data analytics techniques to gather user data from various application domains, enabling the creation of security user profiles that contain data suitable for user authentication. Specifically, these methods are capable of identifying patterns in the users' data and then using said patterns to detect legitimate but anomalous activities performed by the users. Furthermore, we propose an innovative mechanism that dynamically integrates these profiles to create a comprehensive and global security profile for user authentication. Typically, each profile represents a distinctive entity detailing infrequent user behaviors that significantly impact identity verification. The verification process involves posing user challenge questions generated from these integrated profiles. The generated user profiles ensure the selection of questions that meet both security and usability requirements. We uphold security by issuing each question from the integrated user profiles only once, protecting user responses from potential compromise. We prioritize usability by using fresh data, which helps legitimate users recall and complete the challenge easily.</description><subject>Analytical models</subject><subject>Authentication</subject><subject>Behavioral data analytics</subject><subject>Behavioral modeling</subject><subject>Computational modeling</subject><subject>Computers</subject><subject>Data analysis</subject><subject>Data models</subject><subject>Focusing</subject><subject>Information security</subject><subject>Security</subject><subject>Usability</subject><subject>User profile</subject><issn>2768-0940</issn><isbn>9798350364910</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2024</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNqFjs0KgkAYALcgSMo36PC9gPbtj67bMSvqEoJ5liVW2lCMXQt8-zrUudPAzGUIAYoxpajWp_Kc5ylLhIwZMhFTlIlChhMSKqkyniBPhaI4JQGTaRahEjgnofd3RORUSklZQFRZFRsozfXp7DBC5Y2DwvWNbY2HpnewNTf9sr3TLez0oKFo9fDxnV-SWaNbb8IvF2R12F_yY2SNMfXD2U67sf5d8T_5DVoJOd0</recordid><startdate>20241022</startdate><enddate>20241022</enddate><creator>Sulayman, Iman I. M. Abu</creator><creator>Ouda, Abdelkader</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20241022</creationdate><title>SUP: Security User Profiles for Behavioral Data Platforms</title><author>Sulayman, Iman I. M. Abu ; Ouda, Abdelkader</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-ieee_primary_107590203</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Analytical models</topic><topic>Authentication</topic><topic>Behavioral data analytics</topic><topic>Behavioral modeling</topic><topic>Computational modeling</topic><topic>Computers</topic><topic>Data analysis</topic><topic>Data models</topic><topic>Focusing</topic><topic>Information security</topic><topic>Security</topic><topic>Usability</topic><topic>User profile</topic><toplevel>online_resources</toplevel><creatorcontrib>Sulayman, Iman I. M. Abu</creatorcontrib><creatorcontrib>Ouda, Abdelkader</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sulayman, Iman I. M. Abu</au><au>Ouda, Abdelkader</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>SUP: Security User Profiles for Behavioral Data Platforms</atitle><btitle>International Symposium on Networks, Computers and Communications</btitle><stitle>ISNCC</stitle><date>2024-10-22</date><risdate>2024</risdate><spage>1</spage><epage>7</epage><pages>1-7</pages><eissn>2768-0940</eissn><eisbn>9798350364910</eisbn><abstract>Integrating user behavior across domains to create comprehensive profiles is crucial for system efficiency and security. This paper delves into the use of data analytics techniques to gather user data from various application domains, enabling the creation of security user profiles that contain data suitable for user authentication. Specifically, these methods are capable of identifying patterns in the users' data and then using said patterns to detect legitimate but anomalous activities performed by the users. Furthermore, we propose an innovative mechanism that dynamically integrates these profiles to create a comprehensive and global security profile for user authentication. Typically, each profile represents a distinctive entity detailing infrequent user behaviors that significantly impact identity verification. The verification process involves posing user challenge questions generated from these integrated profiles. The generated user profiles ensure the selection of questions that meet both security and usability requirements. We uphold security by issuing each question from the integrated user profiles only once, protecting user responses from potential compromise. We prioritize usability by using fresh data, which helps legitimate users recall and complete the challenge easily.</abstract><pub>IEEE</pub><doi>10.1109/ISNCC62547.2024.10759020</doi></addata></record>
fulltext fulltext_linktorsrc
identifier EISSN: 2768-0940
ispartof International Symposium on Networks, Computers and Communications, 2024, p.1-7
issn 2768-0940
language eng
recordid cdi_ieee_primary_10759020
source IEEE Xplore All Conference Series
subjects Analytical models
Authentication
Behavioral data analytics
Behavioral modeling
Computational modeling
Computers
Data analysis
Data models
Focusing
Information security
Security
Usability
User profile
title SUP: Security User Profiles for Behavioral Data Platforms
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-05T00%3A02%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=SUP:%20Security%20User%20Profiles%20for%20Behavioral%20Data%20Platforms&rft.btitle=International%20Symposium%20on%20Networks,%20Computers%20and%20Communications&rft.au=Sulayman,%20Iman%20I.%20M.%20Abu&rft.date=2024-10-22&rft.spage=1&rft.epage=7&rft.pages=1-7&rft.eissn=2768-0940&rft_id=info:doi/10.1109/ISNCC62547.2024.10759020&rft.eisbn=9798350364910&rft_dat=%3Cieee_CHZPO%3E10759020%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-ieee_primary_107590203%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10759020&rfr_iscdi=true