Intruder Detection by Operational Commands
According to Wikipedia, "WikiLeaks is an international, online, self-described not-for-profit organisation publishing submissions of private,
secret, and classified media from anonymous news sources, news leaks, and whistleblowers."
In November 2010, WikiLeaks released the content of U.S. State department diplomatic cables.
Governments worldwide would like to ensure that their secret information is not released to the public.
For example, possible leaks could come from government employees finding and sending secret information out of their building.
This will be a small 1-2 person project.
This project will develop the plans and possibly an initial prototype
for an intruder detection prototype system that monitors users computer input for intruder-like operational commands.
See references, and particularly the video associated with the first reference.
The second reference describes a multi-level strategy for intruder detection.
- Brian Tschinkel, et al., Keystroke Biometric Intrusion Detection,
Proc. Research Day, CSIS, Pace University, 2012.
- John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, and Charles C. Tappert, Developing a Keystroke Biometric System
for Continual Authentication of Computer Users, EISIC Conf., Denmark, 2012.