使用击键动力学和模糊逻辑隶属函数的入侵检测

M. Sridhar, S. Vaidya, P. Yawalkar
{"title":"使用击键动力学和模糊逻辑隶属函数的入侵检测","authors":"M. Sridhar, S. Vaidya, P. Yawalkar","doi":"10.1109/ICTSD.2015.7095873","DOIUrl":null,"url":null,"abstract":"If the password is compromised, either due it being weak or someone getting to know it through other means, the system cannot detect it. To overcome this problem, we propose a system whereby the system can detect whether the current user is the authorized user, a substitute user or an intruder pretending to be a valid user. Therefore the system checks the identity of the user by their behaviour pattern using keystrokes dynamics to authenticate user. A number of samples of login and password attempts of each user is gathered and stored in a database. From the samples collected, keystroke patterns are derived called feature sets and signatures are formed for each user using Fuzzy Logic algorithms. Once signatures are formed, users are authenticated by comparing their typing pattern to the respective signatures formed. We study the performance of such a system based on features like False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus evaluating the efficiency of the system.","PeriodicalId":270099,"journal":{"name":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2015-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Intrusion detection using keystroke dynamics & fuzzy logic membership functions\",\"authors\":\"M. Sridhar, S. Vaidya, P. Yawalkar\",\"doi\":\"10.1109/ICTSD.2015.7095873\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"If the password is compromised, either due it being weak or someone getting to know it through other means, the system cannot detect it. To overcome this problem, we propose a system whereby the system can detect whether the current user is the authorized user, a substitute user or an intruder pretending to be a valid user. Therefore the system checks the identity of the user by their behaviour pattern using keystrokes dynamics to authenticate user. A number of samples of login and password attempts of each user is gathered and stored in a database. From the samples collected, keystroke patterns are derived called feature sets and signatures are formed for each user using Fuzzy Logic algorithms. Once signatures are formed, users are authenticated by comparing their typing pattern to the respective signatures formed. We study the performance of such a system based on features like False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus evaluating the efficiency of the system.\",\"PeriodicalId\":270099,\"journal\":{\"name\":\"2015 International Conference on Technologies for Sustainable Development (ICTSD)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-04-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Technologies for Sustainable Development (ICTSD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTSD.2015.7095873\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Technologies for Sustainable Development (ICTSD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTSD.2015.7095873","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

如果密码被泄露,无论是由于密码太弱,还是有人通过其他方式知道了密码,系统都无法检测到。为了克服这个问题,我们提出了一个系统,通过该系统可以检测当前用户是授权用户、替代用户还是伪装成有效用户的入侵者。因此,系统通过用户的行为模式来检查用户的身份,并使用击键动态对用户进行身份验证。每个用户的许多登录和密码尝试示例被收集并存储在数据库中。从收集到的样本中,获得称为特征集的击键模式,并使用模糊逻辑算法为每个用户形成签名。签名形成后,通过将用户的输入模式与各自形成的签名进行比较,对用户进行身份验证。我们基于错误接受率(FAR)和错误拒绝率(FRR)等特征来研究这种系统的性能,从而评估系统的效率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Intrusion detection using keystroke dynamics & fuzzy logic membership functions
If the password is compromised, either due it being weak or someone getting to know it through other means, the system cannot detect it. To overcome this problem, we propose a system whereby the system can detect whether the current user is the authorized user, a substitute user or an intruder pretending to be a valid user. Therefore the system checks the identity of the user by their behaviour pattern using keystrokes dynamics to authenticate user. A number of samples of login and password attempts of each user is gathered and stored in a database. From the samples collected, keystroke patterns are derived called feature sets and signatures are formed for each user using Fuzzy Logic algorithms. Once signatures are formed, users are authenticated by comparing their typing pattern to the respective signatures formed. We study the performance of such a system based on features like False Acceptance Rate (FAR) and False Rejection Rate (FRR), thus evaluating the efficiency of the system.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信