Dissertation > Excellent graduate degree dissertation topics show

Masquerade Detection Based on Smartphone

Author: FengYing
Tutor: YinChuanHuan
School: Beijing Jiaotong University
Course: Computer Science and Technology
Keywords: Masquerade Detection Data Mining HMM SVM
CLC: TP309
Type: Master's thesis
Year: 2011
Downloads: 82
Quote: 0
Read: Download Dissertation


In recent years, the masquerade attack in the proportion of computer security incident is constantly increasing, becoming one of the most serious damage to the system attacking. Meanwhile with the popularity of smartphone, more users start to deposit important imformation into it, when the phone is being stolen, users more concern about the safety of the information in mobile phone. So finding out the illegal users and preventing effectively have become the issue that need to be resolved.The ways to find out the illegal user are various, and many scholars judge masquerade detection behavior on the changes of multiple performance indexes of mobile phone, but the researches on finding out illegal user by mining the user’s keyboard behavior are few. So refer to predecessors’ experience, this paper puts forward the masquerade detection based on the keyboard smartphones. In fact, the history of masquerade detection research has more than 20 years, and experiments prove that many of the algorithms in theory of statistical analysis, data mining and machine learning achieve very good results. But whether these algorithms are also suitable in masquerade detection of smartphone keyboard, whether these algorithms have very good application, and whether we have to improve it, these are the starting point of this subject. The Apriori algorithm based on data mining, the former backward algorithm and B-M algorithm based on hidden markov models, and rapid markov nuclear function algorithm based on suffix tree have been good applicable on the research of intrusion detection based on sequence. So the work of this paper is the study of the applications of these algorithms on smartphone.After the proposal, we have done the following work:1. Research of the three types of algorithm and the appropriate improvement according to the subject.2. Select training set and test set, and do the experiments of the algorithms.3. We conclude that the three types of algorithms are also applicable on the mobile terminal and find out the optimal algorithm.4. Compare with PC keyboard, pove that the three types of algorithms are more applicable on masquerade detection based on smartphone keyboard.

Related Dissertations

  1. Soft Sensor of Naphtha Dry Point on Support Vector Machines Regression,TE622.1
  2. The Research of the Fault Diagnoses Algorithm for the Liquid Rocket Engine Testing Bed Based on PCA-SVM,V433.9
  3. Multiple ANN/HMM Hybrid Used in Speech Recognition,TN912.34
  4. ISAR Imaging Simulation of Space Targets and Target Recognition Based on ISAR Images,TN957.52
  5. Research on Autamatic Music Structrue Analysis,TN912.3
  6. Research on Feature Extraction and Classification of Pulse Waveform for Cholecystitis and Nephrotic Syndrome Diagnosis,TP391.41
  7. Research on Classification Method of Tongue Substance Color and Tongue Coating Color Based on SVM,TP391.41
  8. The Research on Paper Currency Classification Method Based on Harr-Like Feature and Minimal Ball Including Samples,TP391.41
  9. A Study on Healthcare Product Marketing Based on Data Mining Technology,F426.72
  10. Gao Zhong-ying academic thought and experience and use of Bufei Decoction treatment of common diseases of the respiratory system drug law,R249.2
  11. Bing- thick academic thought and clinical experience and empirical studies apply to turtle soups treatment of chronic kidney disease,R249.2
  12. The Design and Implementation of Bicluster Data Analyzing Software,TP311.52
  13. Research on Clustering Algorithm Based on Mutation Particle Swarm Optimization,TP18
  14. Research on Fuzzy C-Mean Clustering Algorithm Based on Particle Swarm Optimization and Shuffled Frog Leaping Algorithm,TP18
  15. Research on Clustering Algorithm Based on Genetic Algorithm and Rough Set Theory,TP18
  16. Measurement and Reconstruction of Ion Channel Current for Cell Membrane in Rat’s Cerebral Cortex,Q42
  17. Based on data mining research tax audit case selection,F812.42
  18. Community-oriented education, personalized learning system and its implementation,TP391.6
  19. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  20. Data warehouse technology in the banking customer management systems research and implementation,TP315
  21. A Research on Speech Recognition Technology,TN912.34

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile