首页> 外文期刊>Applied Artificial Intelligence >Continuous Authentications Using Frequent English Terms
【24h】

Continuous Authentications Using Frequent English Terms

机译:使用常用英语术语进行连续认证

获取原文
获取原文并翻译 | 示例
           

摘要

Most of the current computer systems authenticate a user's identity only at the point of entry to the system (i.e., login). However, an effective authentication system includes continuous or frequent monitoring of the identity of a user already logged into a system to ensure the validity of the identity of the user throughout a session. Such a system is called a continuous or active authentication system. An authentication system equipped with such a security mechanism protects the system against certain attacks including session hijacking that can be performed later by a malicious user. The aim of this research is to advance the state-of-the-art of the user-active authentication research using keystroke dynamics. Through this research, we assess the performance and influence of various keystroke features on keystroke dynamics authentication systems. In particular, we investigate the performance of keystroke features on a subset of most frequently used English words. The performance of four features including key duration, flight time latency, diagraph time latency, and word total time duration are analyzed. A series of experiments is performed to measure the performance of each feature individually as well as the results from the combinations of these features. More specifically, four machine learning techniques are adapted for the purpose of assessing keystroke authentication schemes. The selected classification methods are Support Vector Machine (SVM), Linear Discriminate Classifier (LDC), K-Nearest Neighbors (K-NN), and Naive Bayesian (NB). Moreover, this research proposes a novel approach based on sequential change-point methods for early detection of an imposter in computer authentication without the needs for any modeling of users in advance, that is, no need for a-priori information regarding changes. The proposed approach based on sequential change-point methods provides the ability to detect the impostor in early stages of attacks. The study is performed and evaluated based on data collected for 28 users. The experimental results indicate that the word total time feature offers the best performance result among all four keystroke features, followed by diagraph time latency. Furthermore, the results of the experiments also show that the combination of features enhances the performance accuracy. In addition, the nearest neighbor method performs the best among the four machine learning techniques.
机译:当前大多数计算机系统仅在系统进入点(即登录)时认证用户身份。但是,有效的认证系统包括对已经登录系统的用户身份的连续或频繁监视,以确保整个会话期间用户身份的有效性。这样的系统称为连续或主动认证系统。配备有这种安全机制的身份验证系统可以保护系统免受某些攻击,包括会话劫持,这些劫持以后可能由恶意用户执行。这项研究的目的是利用击键动力学来发展用户主动认证研究的最新技术。通过这项研究,我们评估了各种击键功能的性能以及对击键动态身份验证系统的影响。特别是,我们调查了最常用的英语单词的一部分上的击键功能的性能。分析了四个功能的性能,包括键持续时间,飞行时间潜伏期,图表时间潜伏期和单词总持续时间。进行了一系列实验来分别测量每个功能的性能以及这些功能组合的结果。更具体地,为了评估击键认证方案的目的,采用了四种机器学习技术。选择的分类方法是支持向量机(SVM),线性区分分类器(LDC),K最近邻(K-NN)和朴素贝叶斯(NB)。此外,这项研究提出了一种基于顺序更改点方法的新颖方法,用于在计算机身份验证中尽早发现冒名顶替者,而无需事先对用户进行任何建模,也就是说,不需要有关更改的先验信息。所提出的基于顺序变化点方法的方法提供了在攻击的早期阶段检测冒名顶替者的能力。这项研究是基于为28位用户收集的数据进行和评估的。实验结果表明,单词总时间功能在所有四个按键功能中提供了最佳的性能结果,其次是字线图时间延迟。此外,实验结果还表明,特征的组合提高了性能精度。此外,最近邻居方法在四种机器学习技术中表现最佳。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号