AI Engineer - Learn how to integrate AI into software applications
Learn Backend Development Part-Time, Online
Overview
Syllabus
Intro
Types of attack
What drives attack sophistication
Evolution of attack and detection methods
Behavioral detection: User Behavior Analysis
Behavioral detection: Behavioral biometric detection
Behavioral Detection Use Cases
User Behavioral Analysis Examines the context of the interactions
Behavioral biometrics available depends on the client
Behavioral biometrics - Mouse Motion Timing
Behavioral biometrics - Mouse Velocity
Behavioral biometrics - Mouse Acceleration
Behavioral biometrics - Touch interactions Machine
Behavioral biometrics - Key Press Metrics
Behavioral biometrics - Spoofing • Many different ways to falsify inputs
Why use behavioral detection? Pros
Taught by
OWASP Foundation