Share Email Print
cover

Proceedings Paper

Identifying criminal activities at the operating system level
Author(s): Khaled Hussain; Sampada Sapre; Poonam Hajgude
Format Member Price Non-Member Price
PDF $14.40 $18.00

Paper Abstract

This paper presents a scheme to support curtailing illegal activities that are carried out with the help of computers. The paper focuses on determining criminal character of a user by analyzing user’s interactions with the computer at the operating system level. Doing this at the operating system level gives an advantage of catching all interactions of the user with the computer. User interaction information is obtained during the system use and this information is classified using neural network. Neural network does the processing to obtain the criminal character of the user. A sample test was conducted on 200 different users (50 criminal users and 150 normal users). The results reported show that the proposed system is practical and accurate.

Paper Details

Date Published: 20 May 2005
PDF: 9 pages
Proc. SPIE 5778, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV, (20 May 2005); doi: 10.1117/12.603044
Show Author Affiliations
Khaled Hussain, Univ. of Central Florida (United States)
Sampada Sapre, Univ. of Central Florida (United States)
Poonam Hajgude, Univ. of Central Florida (United States)


Published in SPIE Proceedings Vol. 5778:
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV
Edward M. Carapezza, Editor(s)

© SPIE. Terms of Use
Back to Top