Salvador Mandujano

Learn More
This paper describes a clustering-based system to enhance user authentication by applying fuzzy techniques to biometric data in order to deter password sharing. Fuzzy c-Means is used to train personal, per-keyboard profiles based on the keystroke dynamics of users when entering passwords on a keyboard. These profiles use DES encryp-tion taking the actual(More)
This paper describes a variation to the traditional intrusion detection approach motivated by longstanding challenges and recent trends in information security. Intrusion detection systems have historically focused on the protection of local resources by identifying signs of malicious activity that may help administrators prevent a break-in and limit its(More)
Software vulnerabilities are potential attack points in computing systems that can lead to considerable losses and severe security incidents. The way in which the information describing these vulnerabilities is handled is extremely important. Vulnerability data is very sensitive and therefore should be disclosed to the right people in the right(More)
Even when the benefits of using knowledge representation and management techniques have been already acknowledged by the intrusion detection community, little has been done to enable security technologies with them. We present an ontology-based multi-agent architecture that implements Outbound Intrusion Detection, an intrusion detection approach concerned(More)