K.N. Shiv Subramaniam, S. Raj Bharath, S. Ravinder
{"title":"使用击键分析改进的认证机制","authors":"K.N. Shiv Subramaniam, S. Raj Bharath, S. Ravinder","doi":"10.1109/ICICT.2007.375389","DOIUrl":null,"url":null,"abstract":"In this paper, a new methodology has been proposed by which the keystroke analysis can be combined with the existing authentication mechanisms through keyboard to improve the security of delicate applications to a very high extent. It can be useful to ascertain the intruders and reject them from the system, provided that we are able to deal with the typing rhythms of the intruders. Unlike other techniques, keystroke sampling does not require any specific hardware or software tool but just the computer in which the user enters text. Our approach can rely on what is typed by people because of their normal job, preferably username and password, and show attractive accuracies. As a consequence, we argue that our method can be used as a complementary way for user authentication and as an aid to intrusion detection to improve computer security.","PeriodicalId":206443,"journal":{"name":"2007 International Conference on Information and Communication Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Improved Authentication Mechanism Using Keystroke Analysis\",\"authors\":\"K.N. Shiv Subramaniam, S. Raj Bharath, S. Ravinder\",\"doi\":\"10.1109/ICICT.2007.375389\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a new methodology has been proposed by which the keystroke analysis can be combined with the existing authentication mechanisms through keyboard to improve the security of delicate applications to a very high extent. It can be useful to ascertain the intruders and reject them from the system, provided that we are able to deal with the typing rhythms of the intruders. Unlike other techniques, keystroke sampling does not require any specific hardware or software tool but just the computer in which the user enters text. Our approach can rely on what is typed by people because of their normal job, preferably username and password, and show attractive accuracies. As a consequence, we argue that our method can be used as a complementary way for user authentication and as an aid to intrusion detection to improve computer security.\",\"PeriodicalId\":206443,\"journal\":{\"name\":\"2007 International Conference on Information and Communication Technology\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-03-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2007 International Conference on Information and Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT.2007.375389\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 International Conference on Information and Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT.2007.375389","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved Authentication Mechanism Using Keystroke Analysis
In this paper, a new methodology has been proposed by which the keystroke analysis can be combined with the existing authentication mechanisms through keyboard to improve the security of delicate applications to a very high extent. It can be useful to ascertain the intruders and reject them from the system, provided that we are able to deal with the typing rhythms of the intruders. Unlike other techniques, keystroke sampling does not require any specific hardware or software tool but just the computer in which the user enters text. Our approach can rely on what is typed by people because of their normal job, preferably username and password, and show attractive accuracies. As a consequence, we argue that our method can be used as a complementary way for user authentication and as an aid to intrusion detection to improve computer security.