期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Improved Keystroke Authentication Accuracy Based on Statistics and Weight 被引量:2
1
作者 Li Jian Guo Xiaojing +1 位作者 Li Meiyun Li Ruifan 《China Communications》 SCIE CSCD 2012年第7期36-41,共6页
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr... Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last, 展开更多
关键词 AUTHENTICATION BIOMETRICS keystroke dynamics
下载PDF
Performance Evaluation of an Anomaly-Detection Algorithm for Keystroke-Typing Based Insider Detection 被引量:2
2
作者 Liang He Zhixiang Li Chao Shen 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第5期513-525,共13页
Keystroke dynamics is the process to identify or authenticate individuals based on their typing rhythm behaviors. Several classifications have been proposed to verify a user's legitimacy, and the performances of thes... Keystroke dynamics is the process to identify or authenticate individuals based on their typing rhythm behaviors. Several classifications have been proposed to verify a user's legitimacy, and the performances of these classifications should be confirmed to identify the most promising research direction. However, classification research contains several experiments with different conditions such as datasets and methodologies. This study aims to benchmark the algorithms to the same dataset and features to equally measure all performances. Using a dataset that contains the typing rhythm of 51 subjects, we implement and evaluate 15 classifiers measured by Fl-measure, which is the harmonic mean of a false-negative identification rate and false-positive identification rate. We also develop a methodology to process the typing data. By considering a case in which the model will reject the outsider, we tested the algorithms on an open set. Additionally, we tested different parameters in random forest and k nearest neighbors classifications to achieve better results and explore the cause of their high performance. We also tested the dataset on one-class classification and explained the results of the experiment. The top-performing classifier achieves an Fl-measure rate of 92% while using the normalized typing data of 50 subjects to train and the remaining data to test. The results, along with the normalization methodology, constitute a benchmark for comparing the classifiers and measuring the performance of keystroke dynamics for insider detection. 展开更多
关键词 keystroke dynamics insider identification Fl-measure NORMALIZATION one-class classification
原文传递
TKCA:a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
3
作者 Lulu Yang Chen Li +2 位作者 Ruibang You Bibo Tu Linghui Li 《Cybersecurity》 EI CSCD 2021年第1期177-192,共16页
Keystroke-based behavioral biometrics have been proven effective for continuous user authentication.Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing s... Keystroke-based behavioral biometrics have been proven effective for continuous user authentication.Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some tasks.It remains a considerable challenge to authenticate users continuously and accurately with short keystroke inputs collected in uncontrolled settings.In this work,we propose a Timely Keystroke-based method for Continuous user Authentication,named TKCA.It integrates the key name and two kinds of timing features through an embedding mechanism.And it captures the relationship between context keystrokes by the Bidirectional Long Short-Term Memory(Bi-LSTM)network.We conduct a series of experiments to validate it on a public dataset-the Clarkson II dataset collected in a completely uncontrolled and natural setting.Experiment results show that the proposed TKCA achieves state-of-the-art performance with 8.28%of EER when using only 30 keystrokes and 2.78%of EER when using 190 keystrokes. 展开更多
关键词 keystroke dynamics Continuous user authentication EMBEDDING LSTM Bi-LSTM
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部