Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

November Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the November 2021 Edition of the journal. The last date of research paper submission is October 15, 2021.

An Improved Framework for Intrusion Prevention in a Host-based Biometric Identification System

Idris Mohammed Kolo, Salihu Alhassan, Hussain Abubakar Zubairu in Security

International Journal of Applied Information Systems
Year of Publication: 2018
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:Idris Mohammed Kolo, Salihu Alhassan, Hussain Abubakar Zubairu
10.5120/ijais2018451751
Download full text
  1. Idris Mohammed Kolo, Salihu Alhassan and Hussain Abubakar Zubairu. An Improved Framework for Intrusion Prevention in a Host-based Biometric Identification System. International Journal of Applied Information Systems 12(12):15-18, April 2018. URL, DOI BibTeX

    @article{10.5120/ijais2018451751,
    	author = "Idris Mohammed Kolo and Salihu Alhassan and Hussain Abubakar Zubairu",
    	title = "An Improved Framework for Intrusion Prevention in a Host-based Biometric Identification System",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "April 2018",
    	volume = 12,
    	number = 12,
    	month = "Apr",
    	year = 2018,
    	issn = "2249-0868",
    	pages = "15-18",
    	url = "http://www.ijais.org/archives/volume12/number12/1027-2018451751",
    	doi = "10.5120/ijais2018451751",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

This research work is aimed at proposing a framework for intrusion prevention on host-based biometric identification systems (BIS). Intrusive activities in biometric identification systems are mostly perpetuated before the existing prevention systems prevent its future occurrence if the same pattern is exhibited by the perpetuator. The research produced a framework that shows an inclusion of a sensor database that registered all acceptable and certified sensors by the system to capture biometric image. This framework has shown using a developed application to some great extent how it is used to minimize the issue of fake template in the database which will make compromise easy. Once a sensor is attached to the BIS its status will be immediately shown and accessed for qualification to capture image.

Reference

  1. Jain, A. K., Ross, A, and Prabhakar, S. 2004. An Introduction to Biometric Recognition. IEEE Transaction on Circuits and Systems for Video Technology, 14(1), 4–20.
  2. Mgabile, T., Msiza, I. S, and Dube, E. 2012. Anomaly based intrusion detection for Biometric Identification System Using neural Network. International Conference on Artificial Intelligent and Image Processing. Dubai, (December, 2012).
  3. Ioannis M , Yves P., Sabine D., Elsa L., Carlos R., Martin U, and Marcelino C. 2013. European Union: Biometric at the frontier.
  4. Jain, B. 2005. Intrusion Prevention and Vulnerability Assessment in Sachet intrusion detection. Masters Thesis. Department of Computer Science and Engineering. Indian Institue of Technology, Kanpur.
  5. Raymond, T. 2003. Fingerprint Image Enhancement and Minutiae Extraction. Unpublished Phd thesis submitted to School of Computer Science and Software Engineering. University of Western Australia.
  6. Babatunde, I. G., Charles, A.O., and Olatubosun, O. 2012. A mathematical modeling method for fingerprint ridge segmentation and normalization. International Journal of Computer Science and Information Technology & Security, 2(2), 263-267.
  7. Arjunwadkar, M., and Kulkarni, R.V. 2010. The rule based intrusion detection and prevention model for biometric systems. Journal of Emerging Trends in Computing and Information Science, 1(2), 117-120.
  8. Abdullahi M. B., Fati I. and Mohammed A. A. 2016. Performance analysis of particle swarm optimization algorithm-based parameter tuning for fingerprint image enhancement. Futures Technologies Conference. IEEE transaction. Pg: 528-536.

Keywords

Biometric Systems, Intrusion prevention Architecture, Host-based Biometric System Framework