Statistical analysis of keystroke for solving the computer networks users authenticating problems
DOI:
https://doi.org/10.30837/rt.2019.2.197.10Keywords:
information security, keystroke, keystroke digraph, password authentication, continuous authenticationAbstract
The analysis of the statistical features of keyboard writing is carried out. The histograms of the absolute values of the digraph time parameters (times of pressing and pause between pressing) do not correspond to the Gaussian distribution. The histograms of the relations of the temporal parameters of digraphs indicate a close to Gaussian distribution, that is, the “randomness” of changes in the parameters of keystroke decreases. Approaches to the construction of complex authentication algorithms that take into account the statistical features of keystroke are proposed.References
Сравнительный анализ перспективных технологий аутентификации пользователей ПК по клавиатурному почерку / В. А. Алексеев, Д. В. Маслий, Д. Ю. Горелов // Радиотехника. 2017. Вып. 189. С. 195-201.
Парольная и непрерывная аутентификация по клавиатурному почерку средствами математической статистики / В. Е. Хиценко, Д. С. Крутохвостов // Вопросы кибербезопасности. 2017. № 5 (24). С. 91-98.
Alshehri, A., Coenen, F., & Bollegala, D. (2017). Accurate continuous and non-intrusive user authentication with multivariate keystroke streaming. In IC3K 2017 // Proceedings of the 9th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management Vol. 1 (pp. 61-70).
Модифицированный метод диграфов в задаче аутентификации пользователей по клавиатурному почерку / В.А. Алексеев, Ю.А. Синица, Д.Ю. Горелов // Защита информации. Киев, 2017. Вып. 4. С. 252-261.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).