- Statistical decision making for authentication and intrusion detection
- Number of pages
- Amsterdam: Informatics Institute
- IAS technical report
- Volume | Edition (Serie)
- Document type
- Faculty of Science (FNWI)
- Informatics Institute (IVI)
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this problem and propose alternatives based on a principled decision-making view point. We examine the general technique in some toy problems, and then validate it on real-world data from an RFID access control system. The results indicate that the approach could be useful in other decision-making scenarios where there is a lack of adversary data.
If you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library, or send a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible.