期刊文献+

基于口令击键过程的用户身份识别方法研究 被引量:3

A NEW APPROACH FOR USER AUTHENTICATION BASED ON USER KEYSTROKES
原文传递
导出
摘要 口令保护机制是计算机系统及其网络安全管理中重要的一环。如何有效防止因口令失窃所造成计算机及其网络系统的非法进入,一直是一个倍受关注的问题。为此本文提出了一种利用用户口令输入时的击键特征进行用户身份认证的方法。该方法利用用户在点击键盘时所产生的按键压力和击键频率,构造出能够描述每个用户特有的击键特征向量,并由此提出了一种基于有限正例样本集合识别正反例的归纳方法。相应的实验结果表明这种用户身份认证方法,具有较高的用户识别能力。 The password plays an important part in security management for computers and networks. How to prevent illegal intrusion due to password stealing is always one open problem. In this paper, a new approach is proposed to identify user by utilizing his keystroke features generated by user password input process. The keystroke pressure and frequency when user strikes the keyboard to enter his password is used to construct a peculiar keystroke vector representing each user identity respectively. A new algorithm is put forward to classify positive and negative examples only by a limited positive examples. The related experiment indicates this approach has a good user discerning ability.
出处 《模式识别与人工智能》 EI CSCD 北大核心 2003年第2期252-256,共5页 Pattern Recognition and Artificial Intelligence
关键词 用户身份识别 口令击键 口令保护机制 网络安全 计算机网络 Biometrics, User Authentication, Security Management
  • 相关文献

参考文献3

  • 1Monrose F, Rubin A D. Keystroke Dynamics as a Biometric for Authentication. Future Generation Computing Systems (FGCS)Journal: Security on the Web (special issue), 2000, 341 - 345.
  • 2Monrose F, Reiter M K, Wetzel S. Password Hardening Based on Keystroke Dynamics. In: Proc of the 6th ACM Conference on Computer and Communication Security, Hawaii, USA, 1999, 26- 32.
  • 3Robinson J A, Liang V M, Chambers J A M, MacKenzie C L. Computer User Verification Using Login String Keystroke Dynamics IEEE Trans on Systems, Man, and Cybernetics, Part A, 1998, 28(2): 63-70.

同被引文献19

  • 1史扬,曹立明.基于击键特征的用户身份校验[J].计算机工程,2005,31(6):120-122. 被引量:8
  • 2[美]埃克尔著,陈吴鹏译.Java编程思想[M].北京:机械工业出版社出版,2007,06.
  • 3侯俊杰.深入浅出MFC[M].武汉:华中科技大学出版社,2001..
  • 4边肇祺,张学工,等.模式识别(第二版)[M].北京:清华大学出版社,2004.
  • 5Monrose F,Rubin A D.Keystroke dynamics as a biometric for authentication[J].Funture Generation Systems,2000,16:351-359.
  • 6Gaines R,Lisowski W,Press S.Authorization by keystroke timing:some preliminary results,R-2560-NSF[R].Rand Corporation,1980.
  • 7Leggett J,Williams G,Usnick J.Dynamic identity verification via keystroke characteristics[J].International Journal of Man-Machine Studics,1991,35:859-870.
  • 8Napier R,Laberty W,Mahar W.Keyboard user verification:toward an accurate,efficient,and ecologically valid algorithm[J].International Journal of Human-Computer Studies,1995,43:213-222.
  • 9Bleha S,Slivinsky C,Hussien B.Computer access security systems using keystroke dynamics[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,1990,12(12):1217-1222.
  • 10Brown M.User Identification via keystroke characteristics of typed names using neural networks[J].International Journal of Man-Machine Studies,1993,39(6):999-1014.

引证文献3

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部