Improvements to Keystroke-Based Authentication By Adding Linguistic Context

被引:0
|
作者
Goodkind, Adam [1 ]
Brizan, David Guy [1 ]
Rosenberg, Andrew [2 ]
机构
[1] CUNY, Grad Ctr, New York, NY 10016 USA
[2] CUNY Queens Coll, New York, NY USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional keystroke-based authentication methods rely on timing of and between individual keystrokes, oblivious to the context in which the typing is taking place. By incorporating linguistic context into a keystroke-based user authentication system, we are able to improve performance, as measured by EER. Taking advantage of patterns in keystroke dynamics, we show that typists employ unique behavior relative to syntactic and lexical constructs, which can be used to help identify the typist.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Utilizing overt and latent linguistic structure to improve keystroke-based authentication
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    [J]. IMAGE AND VISION COMPUTING, 2017, 58 : 230 - 238
  • [2] Keystroke-Based Biometric Authentication in Mobile Devices
    Urtiga, E. V. C.
    Moreno, E. D.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 383 - 390
  • [3] Introducing touchstroke: keystroke-based authentication system for smartphones
    Kambourakis, Georgios
    Damopoulos, Dimitrios
    Papamartzivanos, Dimitrios
    Pavlidakis, Emmanouil
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 542 - 554
  • [4] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Nauman, Mohammad
    Ali, Tamleek
    Rauf, Azhar
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2149 - 2161
  • [5] TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
    Nauman, Mohammad
    Ali, Tamleek
    [J]. INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 286 - +
  • [6] Keystroke-Based Authentication by Key Press Intervals as a Complementary Behavioral Biometric
    Giroux, Shallen
    Wachowiak-Smolikova, Renata
    Wachowiak, Mark P.
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 80 - 85
  • [7] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    [J]. Cybersecurity, 4
  • [8] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    [J]. CYBERSECURITY, 2021, 4 (01)
  • [9] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Mohammad Nauman
    Tamleek Ali
    Azhar Rauf
    [J]. Telecommunication Systems, 2013, 52 : 2149 - 2161
  • [10] Combined Use of Pattern Recognition Algorithms for Keystroke-based Continuous Authentication System
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Arseni, Stefan C.
    Fratu, Octavian
    [J]. 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,