期刊文献+

融合击键内容和击键行为的持续身份认证 被引量:3

Continuous authentication fusing keystroke behavior and keystroke content
下载PDF
导出
摘要 为提高真实击键场景中用户的持续身份认证能力,搭建完全自由的实验环境采集击键数据。将连续击键事件中各后置击键的频次作为击键内容特征,将排序后的连续击键时间间隔序列作为击键行为特征,引入改进的Yager证据合成理论融合击键内容域和击键行为域的子分类器得到最终的持续身份认证模型。实验结果表明,与现有的击键认证模型相比,采用融合技术的认证方法提高了用户持续身份认证的准确率,在真实的内网中有应用价值。 To improve the user’s continuous identity authentication capability in real keystroke scenarios,a completely free experi-mental environment was built to collect keystroke data.The frequency of each post keystroke in the continuous keystroke event was taken as the keystroke content feature,and the sequence of consecutive keystroke time interval was taken as the keystroke behavior feature,and the improved Yager theory of evidence was introduced to fuse the sub-classifier of keystroke content domain and keystroke behavior domain to obtain the final continuous identity authentication model.Experimental results show that compared with the existing keystroke authentication model,the authentication method using fusion technology improves the accuracy of user’s continuous identity authentication,and it has application value in real intranet.
作者 王凯 宋礼鹏 郑家杰 WANG Kai;SONG Li-peng;ZHENG Jia-jie(Research Institute of Big Data and Network Security,School of Data Science and Technology,North University of China,Taiyuan 030051,China;School of Data Science and Technology,North University of China,Taiyuan 030051,China)
出处 《计算机工程与设计》 北大核心 2020年第6期1562-1567,共6页 Computer Engineering and Design
基金 国家自然科学基金项目(61772478) 中北大学第十五届科技立项基金项目(20181539)。
关键词 击键内容特征 击键行为特征 融合身份认证 持续身份认证 自由击键 keystroke content features keystroke behavior features fusion identity authentication continuous identity authentication free keystroke
  • 相关文献

参考文献4

二级参考文献32

  • 1芮挺 ,沈春林 ,Qi TIAN ,张金林 .基于HMM的击键特征用户身份认证[J].计算机工程,2005,31(2):7-9. 被引量:6
  • 2郭华伟,施文康,邓勇,陈智军.证据冲突:丢弃,发现或化解?[J].系统工程与电子技术,2007,29(6):890-898. 被引量:55
  • 3Spillane R. Keyboard apparatus for personal identification[J].IBM Technical Disclosure Bulletin,1975,(3346):1.
  • 4Gunetti D,Picardi C. Keystroke analysis of free text[J].{H}ACM Transactions on Information and System Security,2005,(03):312-347.
  • 5Bleha S,Slivinsky C,Hussien B. Computer access security systems using keystroke dynamics[J].{H}IEEE Transactions on Pattern Analysis and Machine Intelligence,1990,(12):1217-1222.
  • 6Bleha S A,Obaidat M S. Computer users verification using the perceptron algorithm[J].{H}IEEE Transactions on Systems Man and Cybernetics,1993,(03):900-903.
  • 7Brown M,Rogers S J. User identification via keystroke characteristics of typed names using neural networks[J].{H}International Journal of Man-Machine Studies,1993,(06):999-1014.
  • 8Obaidat M S,Sadoun B. A simulation evaluation study of neural network techniques to computer user identification[J].Information Sciences:An International Journal,1997,(1-4):239-258.
  • 9Chen W,Chang W. Applying hidden markov models to keystroke pattern analysis for password verification[A].2004.467-474.
  • 10Rui Ting,Shen Chun-lin,Zhang Jin-lin. HMM-based user authentication with keystroke features (in Chinese)[J].Computer Engineering,2005,(02):7-9.

共引文献5

同被引文献27

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部