计算机科学 ›› 2015, Vol. 42 ›› Issue (11): 203-207.doi: 10.11896/j.issn.1002-137X.2015.11.042
王昱杰,赵培海,王咪咪
WANG Yu-jie, ZHAO Pei-hai and WANG Mi-mi
摘要: 基于键盘行为的已有研究大多限制在实验环境下,并限定用户的输入为特定字符串,或只在有限实验参与者中进行识别,从而导致其无法应用在真实的环境中。为了克服已有研究的局限,解决真实环境中正负样本不均衡和负样本缺失的问题,对真实环境下一千万条用户击键行为进行分析,提出了一种基于键盘行为进行用户识别的方法。该方法使用击键持续时间和击键间隔时间描述用户的击键行为,通过实验选择马氏距离进行用户击键行为相似度的对比,并对未知击键行为进行预测。实验结果表明,该方法可获得80%的预测准确率。
[1] Giot R,Hemery B,Rosenberger C.Low cost and usable multimodal biometric system based on keystroke dynamics and 2d face recognition[C]∥Pattern Recognition (ICPR).Istanbul:IEEE Computer Society,2010:1128-1131 [2] Jain A K,Pankanti S,Prabhakar S,et al.Biometrics:a grandchallenge[C]∥Proceedings of the 17th International Conference Pattern Recognition,2004.Cambridge:IEEE Computer Society,2004:935-942 [3] Jain A K,Ross A,Prabhakar S.An introduction to biometricrecognition[J].IEEE Transactions on Circuits and Systems for Video Technology,2004,14(1):4-20 [4] Prabhakar S,Pankanti S,Jain A K.Biometric recognition:Security and privacy concerns[J].IEEE Security & Privacy,2003,1(2):33-42 [5] Uludag U,Pankanti S,Prabhakar S,et al.Biometric cryptosystems:issues and challenges[J].Proceedings of the IEEE,2004,92(6):948-960 [6] Vadivel A,Majumdar A K,Sural S.Performance comparison of distance metrics in content-based image retrieval applications[C]∥International Conference on Information Technology.Bhubaneswar,India:CIT,2003:159-164 [7] Killourhy K S,Maxion R A.Comparing anomaly-detection algorithms for keystroke dynamics[C]∥Dependable Systems & Networks.Lisbon:IEEE IFIP,2009:125-134 [8] Zhong Y,Deng Y,Jain A K.Keystroke dynamics for user authentication[C]∥Computer Vision and Pattern Recognition Workshops (CVPRW).Providence,RI:IEEE Computer Society,2012:117-123 [9] Monrose F,Reiter M K,Wetzel S.Password hardening based on keystroke dynamics[J].International Journal of Information Security,2002,1(2):69-83 [10] Umphress D,Williams G.Identity verification through keyboard characteristics[J].International Journal of Man-machine Stu-dies,1985,23(3):263-273 [11] Messerman A,Mustafic T,C amtepe S A,et al.Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics[C]∥2011 International Joint Conference Biometrics (IJCB).Washington,DC:IEEE Biometrics Council,2011:1-8 [12] Al Solami E,Boyd C,Clark A,et al.Continuous Biometric Authentication:Can It Be More Practical? [C]∥2010 12th IEEE International Conference High Performance Computing and Communications (HPCC).Melbourne,VIC,2010:647-652 [13] Zack R S,Tappert C C,Cha S H.Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method[C]∥2010 Fourth IEEE International Conference,Biometrics:Theory Applications and Systems (BTAS).Washington,DC:IEEE Biome-trics Council,2010:1-6 [14] Sim T,Janakiraman R.Are digraphs good for free-text key-stroke dynamics?[C]∥Computer Vision and Pattern Recognition,2007(CVPR).Minneapolis,MN,2007:1-6 [15] De Ru W G,Eloff J H P.Enhanced password authenticationthrough fuzzy logic[J].IEEE Expert,1997,12(6):38-45 [16] Tey C M,Gupta P,Gao D.I can be You:Questioning the use of Keystroke Dynamics as Biometrics[C]∥The 20th Annual Network & Distributed System Security Symposium(NDSS).San Diego,CA,2013:134-150 [17] Cho S,Han C,Han D H,et al.Web-based keystroke dynamics identity verification using neural network[J].Journal of Organizational Computing and Electronic Commerce,2000,10(4):295-307 [18] Joyce R,Gupta G.Identity authentication based on keystroke latencies[J].Communications of the ACM,1990,33(2):168-176 [19] Kang P,Hwang S,Cho S.Continual retraining of keystroke dynamics based authenticator[M]∥Advances in Biometrics.Seoul,Korea:Springer Berlin Heidelberg,2007:1203-1211 [20] Yu E,Cho S.GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification[C]∥Procee-dings of the International Joint Conference Neural Networks,2003.Portland,OR,2003:2253-2257 |
No related articles found! |
|