P. Seligman, S.W. Smith.
"Detecting Unauthorized Use in Online Journal Archives: A Case Study."
Proceedings of the IADIS International Conference WWW/Internet 2004.
Volume 1. 209--217. October 2004.
This design decision introduces the potential for trouble: unauthorized users can access the archive if they can find an unprotected proxy machine at a subscribing institution and request material via that machine. (Observant archive staff have noticed abnormal usage patterns and traced them to such unauthorized use.) Unfortunately, this design decision also constrains potential countermeasures: since we cannot change the infrastructures of the subscribers, we instead need to have the archive itself try to detect and respond to incidents of fraudulent use.
In this paper, we describe our experiments to automate these countermeasures.
|Back to home page||Maintained by Sean Smith, firstname.lastname@example.org|