milind sarode - Academia.edu (original) (raw)

milind sarode

Uploads

Papers by milind sarode

Research paper thumbnail of Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition

International Journal of Computer Science, Engineering and Information Technology, 2012

Identifying attackers is a major apprehension to both organizations and governments. Recently, th... more Identifying attackers is a major apprehension to both organizations and governments. Recently, the most used applications for prevention or detection of attacks are intrusion detection systems. Biometrics technology is simply the measurement and use of the unique characteristics of living humans to distinguish them from one another and it is more useful as compare to passwords and tokens as they can be lost or stolen so we have choose the technique biometric authentication. The biometric authentication provides the ability to require more instances of authentication in such a quick and easy manner that users are not bothered by the additional requirements. In this paper, we have given a brief introduction about biometrics. Then we have given the information regarding the intrusion detection system and finally we have proposed a method which is based on fingerprint recognition which would allow us to detect more efficiently any abuse of the computer system that is running.

Research paper thumbnail of Biometrics Authentication Technique for Intrusion Detection Systems Using Fingerprint Recognition

International Journal of Computer Science, Engineering and Information Technology, 2012

Identifying attackers is a major apprehension to both organizations and governments. Recently, th... more Identifying attackers is a major apprehension to both organizations and governments. Recently, the most used applications for prevention or detection of attacks are intrusion detection systems. Biometrics technology is simply the measurement and use of the unique characteristics of living humans to distinguish them from one another and it is more useful as compare to passwords and tokens as they can be lost or stolen so we have choose the technique biometric authentication. The biometric authentication provides the ability to require more instances of authentication in such a quick and easy manner that users are not bothered by the additional requirements. In this paper, we have given a brief introduction about biometrics. Then we have given the information regarding the intrusion detection system and finally we have proposed a method which is based on fingerprint recognition which would allow us to detect more efficiently any abuse of the computer system that is running.

Log In