Study of the possibilities to use keyboard handwriting for the tasks of identifying students in e-learning systems
DOI:
https://doi.org/10.30837/rt.2021.4.207.15Keywords:
information security of e-learning, authentication, keystroke, keystroke digraph, multi-factor classificationAbstract
When using distance education systems, the problem of information security of the educational process arises, which, in addition to external ones, also implies internal threats. One of these threats can be a legitimate user who paid a fraudster to take tests and give visibility to educational activities under his own name. The use of traditional identification methods has two significant drawbacks: firstly, the ambiguity of the identified user, because the identification of the user occurs by the entered pair login-password; secondly, the inability to detect the substitution of an identified user in the process of working with the system. These disadvantages are eliminated by using biometric methods of covert and continuous monitoring.
In the first part of the work the different types of control knowledge tests are analyzed. Taking into account the specifics of the use of covert keyboard monitoring algorithms, the following is proposed: 1) to use tests that do not contain answers; 2) use tests after each learning activities in order to form a user’s biometric vector; 3) use tests with numerical answers in order to minimize the analyzed keystroke digraphs.
An algorithm for user’s profile formation and its identification is proposed in the second part of the work. Its combine qualitative (distribution of the frequencies of using numeric keys groups, comma-separated keys, “plus” and “minus” keys on the main and additional keyboard units) and quantitative (analysis of statistical properties of keystroke digraphs) approaches. The experimentally obtained estimates of the identification accuracy of the proposed algorithm: FAR=4.64% and FRR=6.25%.
References
Zamfiroiu, Alin, Diana Constantinescu, Mădălina Zurini, and Cristian Toma. Secure Learning Management System Based on User Behavior. Applied Sciences 10, no. 21 (October 2020): 7730. DOI:10.3390/app10217730.
Marcela Hernández de Menéndez, Ruben Morales-Menendez, Carlos A. Escobar, Jorge Arinez. Biometric applications in education. International Journal on Interactive Design and Manufacturing (IJIDeM) 15(5). September 2021 DOI:10.1007/s12008-021-00760-6.
Rajamanogaran, M.; Subha, S.; Baghavathi Priya, S. Contactless Attendance Management System using Artificial Intelligence. Journal of Physics: Conference Series, Volume 1714, Issue 1, article id. 012006 (2021). DOI: 10.1088/1742-6596/1714/1/012006.
Jack Curran, Kevin Curran. Biometric Authentication Techniques in Online Learning Environments. In book: Biometric Authentication in Online Learning Environments (pp.266-278). January 2019. DOI:10.4018/978-1-5225-7724-9.ch011.
Aeri Leea, Jin-young Hanb. Effective User Authentication System in an E-Learning Platform. International Journal of Innovation, Creativity and Change (рр. 1101-1113). Volume 13, Issue 3, 2020.
Adetoba B.T., Awodele O., Kuyoro S.O., Nwaocha O. An Improved Authentication and Monitoring System for E-Learning Examination Using Supervised Machine Learning Algorithms (рр. 235-242). International Journal of Scientific & Engineering Research Volume 11, Issue 3, March-2020.
Amr Jadi. New Detection Cheating Method of Online-Exams during COVID-19 Pandemic (рр. 123-130).International Journal of Computer Science and Network Security. VOL.21 No.4, April 2021. https://doi.org/10.22937/IJCSNS.2021.21.4.17
A.V.S. Kumar, Biometric authentication in online learning environments. IGI Global, Information Science Reference, an imprint of IGI Global, 2019.
Homayoon Beigi. Fundamentals of Speaker Recognition. Springer Science + Business Media; 2011.
Teh P S, Teoh A B J, Yue S. A Survey of Keystroke Dynamics Biometrics, The Scientific World Journal, vol. 2013, Article ID 408280, 2013, 24 pages.
Заяць В.М., Уліцький О.О. Алгоритмічне та програмне забезпечення системи розпізнавання людини за її рукомоторними реакціями // Вісник Держ. ун-ту «Львівська політехніка» «Комп’ютерна інженерія та інформаційні технології». 2000. № 392. С.73 – 76.
Тушканов Е.В. Разработка методов и алгоритмов повышения защищенности информации на основе анализа клавиатурного почерка : дис. канд. техн. наук / Санкт-Петербург. нац. исслед. ун-т информационных технологий, механики и оптики, Санкт-Петербург, 2016. 118 с.
Vasyl Alieksieiev, Aleksey Strelnitskiy, Dmitry Gavva, Denis Gorelov, Yuliia Synytsia. Studying of keystroke dynamics statistical properties for biometric user authentication. Proceedings of 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET), Pages 559-563, 2018.
Дослідження статистичних властивостей клавіатурного почерку для вирішення задач аутентифікації користувачів комп’ютерних мереж / Д. Ю. Горелов, В. О. Алєксєєв, В. М. Бублик, Д. В. Маслій // Радиотехника. 2019. Вып. 197. С. 78-85.
Дослідження інформативних параметрів диграфів клавіатурного почерку для задач ідентифікації користувачів комп’ютерних мереж / Д. Ю. Горелов, О. О. Іванова, О. В. Кокорін, Д. В. Маслій, О. В. Литвиненко // Радіотехніка. 2020. Вип. 201. С. 194-200.
Калмыков А.А., Орчаков О.А., Попов В.В Дистанционное обучение. Введение в педагогическую технологию : учеб. пособие / МГТУ МИРЭА. Москва, 2005. 196 с.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).