Abstract
In addition to the traditional passwords or Personal Identification Number (PIN) required for getting accesses to the ressources of Smart Cards, we have investigated several ways to complete this basic security scheme by providing tools for detecting intrusions. Because sometimes due to negligence or violence the PIN is not sufficient to guaranty the card’s security, our interests have focused on systems specialized in detecting abnormal access and use of the card.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Thomas Alexandre, Vincent Cordonnier, “The Radar Concept”, in Proceedings of the Cardtech/Securtech’94 International Conference, Arlington, Virginia, USA, April 10–13, 1994, p87–98.
Thomas Alexandre, “The Radar Concept using Neural Networks”, in Proceedings of the CARDIS’94 First Smart Card Research and Advanced Application Conference, Lille, France, October 24–26, 1994.
D. Anderson, T. F. Lunt, H. S. Javitz, A. Tamaru, A. Valdes, “Detecting Unusual Program Behavior Using the NIDES Statistical Component”, Safeguard Final Report, SRI International, Menlo Park, California, December 1993.
Ivan Bratko, Prolog Programming for Artificial Intelligence second edition, Addison-Wesley, 1990.
H. Demuth, M. Beale, Neural Network Toolbox for Use with Matlab, The MathWorks Inc., 1992.
J. M. Dzierzanowski, K. R. Chrisman, G. J. Mac Kinnon, P.Klahr, “The Authorizer’s Assistant: a knowledge-based credit authorization system for American Express”, in Proceedings of the First Annual Conference on Innovative Applications of Artificial Intelligence Stanford, CA, USA, March 28–30, 1989.
J. Essinger, “Artificial Intelligence in retail banking: two key case studies”, Financial Technology International 1991 Guide, IBC Business Publishing, London, UK, 1990.
Daniel Gardner, Neurobiology of Neural Networks The MIT Press, 1993.
E. Gelenbe, Neural Networks: Advances and Applications, Elsevier Science Publishers, 1991.
N. M. Goldsmith, “Beyond Technology: management expert system projects at American Express Company”, in Proceedings of the IEEE Conference on Managing Expert Systems Programs and Projects, Bethesda, MD, USA, Sept. 10–12, 1990.
R. Jagannathan, A. Tamaru, F. Gildham, D. Anderson, C. Jalali, C. Dodd, H. S. Javitz, A. Valdes, T. E. Lunt and P. G. Neumann, “Next Generation Intrusion-Detection Expert System (NIDES): Software Design Specifications”, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, California, March 1993.
J. Keyes, “Winning back investors’ confidence”, Information Strategy, Vol.8, no.2, Winter 1992.
Teuvo Kohonen, Self-Organization and Associative Memory, 2nd edition, Berlin: Springer-Verlag, 1987.
Teresa E Lunt, “Detecting Intruders in Computer Systems”, in Proceedings of the 1993 Conference on Auditing and Computer Technology, 1993.
M. Minsky, S. Papert, “Perceptron”, The MIT Press, 1969.
D. Nguyen, B. Widrow, “Improving the learning speed of 2-layer neural networks by choosing initial values of the adaptive weights”, International Joint Conference on Neural Networks, Vol. 3, pp 21–26, July 1990.
P. Peyret, “RISC-based, Next-generation Smart Card Microcontroller Chips”, in Proceedings of the CardTech/SecurTech’94 International Conference, Arlington, Virginia, USA, April 10–13, 1994.
L. Piketty, J. Bakin, F. K. Dashiell, J. M. Dzierzanowski, “The Authorizer’s Assistant: a large commercial expert system application”, in Proceedings of the Third Annual Artificial Intelligence and Advanced Computer Technology Conference, Long Beach, CA, USA, April 22–24, 1987.
F. Rosenblatt, “The Perceptron: a Perceiving and Recognizing Automaton”, Project PARA, Cornell Aeronautical Lab. Report 85–460–1, 1957.
D. E. Rumelhart, G. E. Hinton, R. J. Williams, “Learning internal representation by error propagation”, D.Rumelhart and J.Mc Clelland editors,Parallel Distributed Processing: exploring the Microstructure of Cognition, Vol. 1, M.I.T. Press, Cambridge, MA, 1986.
R. Spencer-Smith, Logic and Prolog, AI Group, Middlesex Polytechnic, A Harvester Wheatsheaf Publication, 1991.
T. P. Vogl, J. K. Mangis, A. K. Rigler, W. T. Zink, D. L. Alkon, “Accelerating the convergence of the bakpropagation method”, Biological Cybernetics, Vol. 59, pp 257–263, 1988.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Alexandre, T., Trane, P. (1995). Detecting Intrusions in Smart Card Applications using Expert Systems and Neural Networks. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_40
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_40
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive