首页    期刊浏览 2025年04月28日 星期一
登录注册

文章基本信息

  • 标题:A Novel Approach of Intrusion Detection and Preventionfor Fingerprints
  • 本地全文:下载
  • 作者:Vuda Sreenivasarao
  • 期刊名称:International Journal of Computer Science & Technology
  • 印刷版ISSN:2229-4333
  • 电子版ISSN:0976-8491
  • 出版年度:2010
  • 卷号:1
  • 期号:2
  • 出版社:Ayushmaan Technologies
  • 摘要:Fingerprint system is an important biometric technique for personal identification. The metric used for performance of identification techniques are directly scanned fingerprints or inked impression of fingerprints. The purpose is real-time, high confidence recognition of a person's identity by mathematical analysis of the random patterns that are visible within the finger prints from some distance. Finger prints is a protected internal organ whose random texture is stable throughout life, it can serve as a kind of living password that one need not remember but one always carries along. Because the randomness of finger print patterns has very high dimensionality, recognition decisions are made with confidence levels high enough to support rapid and reliable exhaustive searches through national-sized databases. Finger print recognition has shown to be very accurate for human identification. The metric used for performance of identification techniques are directly scanned fingerprints or inked impression of fingerprints. For better accuracy in matching the images of different decomposition of matching is performed. These parameters perform better in comparing the resultant fingerprints. When tested on a database of images this system is faster and more accurate to analyze the fingerprints matching process. The intrusion detection is an essential supplement of traditional security system. This security system needs the robust automated auditing, intelligent reporting mechanism and robust prevention techniques. We suggest Intrusion Detection and Prevention for human identification through fingerprints. This model contains a scheduler to prepare a schedule to check different logs for possible intrusions, detectors to detect normal or abnormal activity. If activity is normal then alarming and reporting has been executed. If abnormal activity is found the rule engine fires the rule to detect intrusion point and type of intrusion. The model also contains an expert system to detect source of intrusion and suggest best possible prevention technique and suitable controls for different intrusions. This model is also used for security audit as well as alarming and reporting mechanisms. The malicious activity database is stored for future intrusion detection. To detect source tracking backward chaining approach is used. The rules are defined and stored in the Rule engine of the system.
  • 关键词:Image enhancement; Classification; Edge detection; Correlation;Security; attacks; intrusion detection and prevention
国家哲学社会科学文献中心版权所有