RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      KCI등재 SCIE SCOPUS

      A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics

      한글로보기

      https://www.riss.kr/link?id=A104905038

      • 0

        상세조회
      • 0

        다운로드
      서지정보 열기
      • 내보내기
      • 내책장담기
      • 공유하기
      • 오류접수

      부가정보

      다국어 초록 (Multilingual Abstract)

      Keystroke dynamics is a behavioural biometric deployed as a software based method for the authentication and/or identification of a user requesting access to a secured computing facility. It relies on how a user types on the input device (here assumed...

      Keystroke dynamics is a behavioural biometric deployed as a software based method for the authentication and/or identification of a user requesting access to a secured computing facility. It relies on how a user types on the input device (here assumed to be a PC keyboard)-and makes the explicit assumption that there are typing characteristics that are unique to each individual. If these unique characteristics can be extracted-then they can be used, in conjunction with the login details to enhance the level of access security-over and above the possession of the login details alone. Most unique characteristics involve the extraction of keypress durations and multi-key latencies. These character-istics are extracted during an enrollment phase, where a user is requested to login into the computer system repeatedly. The unique characteristics then form a string of some length, proportional to the enrollment character content times the number of attributes extracted. In this study, the deployment of classical string matching features prevalent in the bioinformatics literature such as position specific scoring matrices (motifs) and multiple sequence alignments to provide a novel approach to user verification and identification within the context of keystroke dynamics based biometrics. This study provides quantitative information regarding the values of parameters such as attribute acceptance thresholds, the number of accepted attributes, and the effect of contiguity. In addition, this study examined the use of keystroke dynamics as a tool for user identification. The results in this study yield virtually 100% user authentication and identification within a single framework.

      더보기

      참고문헌 (Reference)

      1 M. VS. de Oliveira, "User authentication based on human typing patterns with artificial neural networks and support vector machines" SBC 2005

      2 A. Peacock, "Typing patterns: A Key to User Identification" 2 (2): 40-47, 2004

      3 M. S. Obaidat, "Simulation evaluation study of neural network techniques to computer user identification" 102 : 239-258, 1997

      4 D. A. Reynolds, "Robust text-independent speaker identification using Gaussian mixture speaker models" 3 (3): 72-83, 1995

      5 F. Monrose, "Password hardening based on keystroke dynamics" 69-83, 2001

      6 A. K. Jain, "On-line signature verification" 35 : 2963-2972, 2002

      7 K. Revett, "On the use of multiple sequence alignment for user authentication via keystroke dynamics" University of East London 112-120, 2007

      8 R. K. Rowe, "Multispectral fingerprint biometrics" United States Military Academy 16-20, 2005

      9 A. Jain, "Introduction to Biometrics, In : Biometrics. Personal Identification in Networked Society" Kluwer Academic Publishers 1-41, 2003

      10 R. Joyce, "Identity authorization based on keystroke latencies" 33 (33): 168-176, 1990

      1 M. VS. de Oliveira, "User authentication based on human typing patterns with artificial neural networks and support vector machines" SBC 2005

      2 A. Peacock, "Typing patterns: A Key to User Identification" 2 (2): 40-47, 2004

      3 M. S. Obaidat, "Simulation evaluation study of neural network techniques to computer user identification" 102 : 239-258, 1997

      4 D. A. Reynolds, "Robust text-independent speaker identification using Gaussian mixture speaker models" 3 (3): 72-83, 1995

      5 F. Monrose, "Password hardening based on keystroke dynamics" 69-83, 2001

      6 A. K. Jain, "On-line signature verification" 35 : 2963-2972, 2002

      7 K. Revett, "On the use of multiple sequence alignment for user authentication via keystroke dynamics" University of East London 112-120, 2007

      8 R. K. Rowe, "Multispectral fingerprint biometrics" United States Military Academy 16-20, 2005

      9 A. Jain, "Introduction to Biometrics, In : Biometrics. Personal Identification in Networked Society" Kluwer Academic Publishers 1-41, 2003

      10 R. Joyce, "Identity authorization based on keystroke latencies" 33 (33): 168-176, 1990

      11 T. F. Smith, "Identification of common molecular subsequences" 147 : 95-197, 1981

      12 D. Maltoni, "Handbook of Fingerprint Recognition" Springer 59-61, 2003

      13 K. S. Sung, "GA SVM wrapper ensemble for keystroke dynamics authentication" 654-660, 2006

      14 M. Tapiador, "Fuzzy keystroke biometrics on web security" IEEE 133-136, 1999

      15 W. G. de Ru, "Enhanced password authentication through fuzzy logic" 12 (12): 38-45, 1997

      16 K. Revett, "Develop-ing a keystroke dynamics based agent using rough sets" Compiegne 56-61, 2005

      17 V. Nalwa, "Automatic on-line signature verifica-tion" 85 : 213-239, 1997

      18 F. Monrose, "Authentication via Keystroke Dynamics" 1997

      19 R. Gaines, "Authentication by keystroke timing: Some preliminary results" Rand Corp 1980

      20 S. T. Magalhães, "An improved statistical keystroke dynamics algorithm" 2005

      21 B. Hussien, "An application of fuzzy algorithms in a computer access security system" 9 : 39-43, 1989

      22 S. B. Needleman, "A general method applicable to the search for similarities in the amino acid sequence of two proteins" 48 : 443-453, 1970

      더보기

      동일학술지(권/호) 다른 논문

      동일학술지 더보기

      더보기

      분석정보

      View

      상세정보조회

      0

      Usage

      원문다운로드

      0

      대출신청

      0

      복사신청

      0

      EDDS신청

      0

      동일 주제 내 활용도 TOP

      더보기

      주제

      연도별 연구동향

      연도별 활용동향

      연관논문

      연구자 네트워크맵

      공동연구자 (7)

      유사연구자 (20) 활용도상위20명

      인용정보 인용지수 설명보기

      학술지 이력

      학술지 이력
      연월일 이력구분 이력상세 등재구분
      2023 평가예정 해외DB학술지평가 신청대상 (해외등재 학술지 평가)
      2020-01-01 평가 등재학술지 유지 (해외등재 학술지 평가) KCI등재
      2010-01-01 평가 등재학술지 유지 (등재유지) KCI등재
      2009-12-29 학회명변경 한글명 : 제어ㆍ로봇ㆍ시스템학회 -> 제어·로봇·시스템학회 KCI등재
      2008-01-01 평가 등재학술지 유지 (등재유지) KCI등재
      2007-10-29 학회명변경 한글명 : 제어ㆍ자동화ㆍ시스템공학회 -> 제어ㆍ로봇ㆍ시스템학회
      영문명 : The Institute Of Control, Automation, And Systems Engineers, Korea -> Institute of Control, Robotics and Systems
      KCI등재
      2005-01-01 평가 등재학술지 선정 (등재후보2차) KCI등재
      2004-01-01 평가 등재후보 1차 PASS (등재후보1차) KCI등재후보
      2002-07-01 평가 등재후보학술지 선정 (신규평가) KCI등재후보
      더보기

      학술지 인용정보

      학술지 인용정보
      기준연도 WOS-KCI 통합IF(2년) KCIF(2년) KCIF(3년)
      2016 1.35 0.6 1.07
      KCIF(4년) KCIF(5년) 중심성지수(3년) 즉시성지수
      0.88 0.73 0.388 0.04
      더보기

      이 자료와 함께 이용한 RISS 자료

      나만을 위한 추천자료

      해외이동버튼