Abstract—Authentication using centralized methods is a primary trust mechanism within most large-scale, enterprise computer networks. This paper proposes using graphs to represent user authentication activity within the network. Using this mechanism over a real enterprise network dataset, we find that non-privileged users and users with system administration privileges have distinguishable graph attributes in terms of size and complexity. In addition, we find that user authentication graphs provide intuitive insights into network user behavior. We believe that understanding these differences in even greater detail will lead to improved user behavior profiling and the elusive detection of authentication credential misuse. I
Passwords are used for user authentication by almost every Internet service today, despite a number ...
Authentication solutions are designed to stop unauthorized users from getting access to a secured sy...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security wea...
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance ...
Determining who has access to personal data is an ongoing problem facing information system entities...
Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. W...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
We present in this paper an alternative method for understanding user-chosen passwords. In password ...
Most users have a multitude of different accounts making it hard to get an overview for security an...
Users experience a crisis of confidence for online activities in the current Internet. Unfortunately...
In this information age, networks are increasingly important. At many points in network routing, pas...
Abstract:- Determining who has access to personal data is an ongoing problem facing information syst...
Basic concepts and classification. It depends on each entity registered in the computer system (user...
Internet users' digital identities consist of accounts for numerous services. These accounts can typ...
Passwords are used for user authentication by almost every Internet service today, despite a number ...
Authentication solutions are designed to stop unauthorized users from getting access to a secured sy...
Today security concerns are on the rise in all area such as banks, government organizations, busines...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security wea...
As large scale enterprise computer networks become more ubiquitous, finding the appropriate balance ...
Determining who has access to personal data is an ongoing problem facing information system entities...
Discerning meaningful information from network log files is an ongoing challenge in cybersecurity. W...
Communicating parties inside computer networks use different kind of identifiers. Some of these iden...
We present in this paper an alternative method for understanding user-chosen passwords. In password ...
Most users have a multitude of different accounts making it hard to get an overview for security an...
Users experience a crisis of confidence for online activities in the current Internet. Unfortunately...
In this information age, networks are increasingly important. At many points in network routing, pas...
Abstract:- Determining who has access to personal data is an ongoing problem facing information syst...
Basic concepts and classification. It depends on each entity registered in the computer system (user...
Internet users' digital identities consist of accounts for numerous services. These accounts can typ...
Passwords are used for user authentication by almost every Internet service today, despite a number ...
Authentication solutions are designed to stop unauthorized users from getting access to a secured sy...
Today security concerns are on the rise in all area such as banks, government organizations, busines...