Understanding users' keystroke patterns for computer access security

被引:24
|
作者
Guven, A [1 ]
Sogukpinar, I
机构
[1] Dogus Univ, Dept Comp Engn, TR-81010 Istanbul, Turkey
[2] Gebze Inst Technol, Dept Comp Engn, TR-41400 Kocaeli, Turkey
关键词
biometrics; keystroke identification; pattern recognition; computer security;
D O I
10.1016/S0167-4048(03)00010-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User authentication is a major problem in gaining access rights for computer resources. A recent approach to enhance the computer access rights is the use of biometric properties as the keystroke rhythms of users. Therefore user authentication for computers can be more secure using keystroke rhythms as biometric authentication. Methods like minimum distance, statistical, vector based, neural network type and data mining techniques have been applied in analyzing the keystroke patterns. In this paper, a vector based algorithm for a recent approach has been applied in the identification of keystroke patterns. Keystroke Identification system that is a neuro physical characteristic is studied to realize biometric authentication.
引用
收藏
页码:695 / 706
页数:12
相关论文
共 50 条
  • [1] COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS
    BLEHA, S
    SLIVINSKY, C
    HUSSIEN, B
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) : 1217 - 1222
  • [2] Verification of computer users using keystroke dynamics
    Obaidat, MS
    Sadoun, B
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 1997, 27 (02): : 261 - 269
  • [3] Understanding Access Stability and Mobility Patterns of Mobile Internet Users
    Li, Yuan
    Jiang, Hao
    Yi, Shuwen
    Zhou, Chen
    Wu, Lihua
    Wu, Ming
    [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 18 - 22
  • [4] A neural network based computer access security system for multiple users
    Anagun, AS
    Cin, I
    [J]. COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (1-2) : 351 - 354
  • [5] Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors
    Lee, Hyungu
    Hwang, Jung Yeon
    Kim, Dong In
    Lee, Shincheol
    Lee, Sung-Hoon
    Shin, Ji Sun
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [6] Computer security impaired by legitimate users
    Besnard, D
    Arief, B
    [J]. COMPUTERS & SECURITY, 2004, 23 (03) : 253 - 264
  • [7] Improving computer access for blind users
    Bouraoui, Amina
    Soufi, Mejdi
    [J]. ADVANCES AND INNOVATIONS IN SYSTEMS, COMPUTING SCIENCES AND SOFTWARE ENGINEERING, 2007, : 29 - 34
  • [8] Understanding Computer Users With Tetraplegia: Survey of Assistive Technology Users
    Caltenco, Hector A.
    Breidegard, Bjorn
    Jonsson, Bodil
    Struijk, Lotte N. S. Andreasen
    [J]. INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION, 2012, 28 (04) : 258 - 268
  • [9] Computer-access authentication with neural network based keystroke identity verification
    Lin, DT
    [J]. 1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, 1997, : 174 - 178
  • [10] A New Model for Understanding Users' IS Security Compliance
    Siponen, Mikko
    Pahnila, Seppo
    Mahmood, Adam M.
    [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 644 - +