Abstract

The article discusses the types of biometric authentication to prevent insider attacks, their comparative analysis. There are various methods of determining insider activity. Today, Data Leak Prevention (DLP) systems, which are used to prevent the leakage of confidential information from the information system, are widespread. However, these software complexes do not allow detecting a potential attacker at an early stage, as well as monitoring the connection of users, since a tight connection is formed between users and computers with access rights of their level. Biometric innovations are a solution that allows providing a sufficient level of security, user convenience and optimization of business processes. Among the main types of biometric authentication methods, static methods of human biometrics have become the most widespread. These include identification based on the papillary pattern on the fingers, the iris and retina of the eye, the pattern of hand veins, the geometry of the hands, and the face. The family of methods using dynamic characteristics include: voice identification, handwriting dynamics, heart rate, and gait. Biometric technologies consist in measuring and using unique physical or behavioral traits of people to distinguish them from each other. Biometric recognition forms a strong connection between a person and his personality as a biometric feature. It cannot be separated from a person, lost or duplicated. So, biometric recognition is a protection method more resistant to social engineering attacks compared to conservative recognition methods (passwords, tokens, etc.).Also the approach to identification of human faces and description of the system of their recognition working in a mode close to real time which allows to trace a subject’s head, and then distinguishes it, comparing initial features of a face with earlier recognized is offered.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call