The aim is to develop a usable security mechanism for identifying computer users on a network. The system establishes trust levels based on the user behaviour to continuously authenticate the user during a session. Monitoring user’s behavior in real time to determine whether recent commands issued by a user are consistent with the user’s historical behavior.
A network will be simulated, user behavior will be retrieved, monitored and verified when a user logs on. the system compares the user's behavioral history with the current behavior to authenticate the user continuously in a session.
The system should also have an interface for new users to store a new user behavior.