首页> 外文学位 >Shared Keystroke Data for Continuous Authentication - Generation and Analysis
【24h】

Shared Keystroke Data for Continuous Authentication - Generation and Analysis

机译:共享的击键数据以进行连续身份验证-生成和分析

获取原文
获取原文并翻译 | 示例

摘要

The standard methods to authenticate a computer or a network user, which typically occur once at the initial log-in, suffer from a variety of vulnerabilities such as masquerading and potential system compromise. An effective solution to this one-time authentication problem is the continuous authentication using behavioral biometrics. Monitoring of a user's keystroke dynamics is a useful mechanism for continuous authentication. Researchers have taken various approaches for the collection and use of keystroke dynamics. However, the privacy issue, the non-availability of large enough datasets for evaluation, the reliability and scalability, and the robustness of the methods are still not well addressed, which are the focus of this dissertation.;First, a systematic study of the security and privacy of the keystroke dynamics approach to continuous authentication is conducted. A rule based data sanitization scheme is developed to detect and remove personally identifiable and other sensitive information from the collected dataset. A data transmission scheme using the Extensible Messaging and Presence Protocol (XMPP) is implemented to guarantee privacy during transmission. Based on these two schemes, two distinct architectures are proposed for providing secure and privacy preserving data processing support for continuous authentication. These architectures provide flexibility of use depending upon the application environment.;Second, the largest publicly accessible keystroke dataset for continuous authentication has been generated. In this research, the details on the collection of a shared dataset for the study of keystroke dynamics are provided. The raw keystroke data was collected from 301 subjects allowing them to transcribe fixed text and answer questions freely. The dataset is characterized to reflect the temporal variations of typing patterns and the perturbations caused by different keyboard layouts.;Third, the effect of the number of subjects on the performance and the reliability and scalability of the keystroke dynamics as the authentication mechanism are explored. Three sets of experiments are conducted with the use of our previously generated large free-text dataset with 291 subjects using two standard classification algorithms. By systematically varying the number of subjects and the size of the typing profile, the findings are: 1) the keystroke authentication system can still achieve a good classification rate when the number of subjects involved is significantly high; 2) the performance is independent of the number of subjects after a certain threshold. The practical implication of our findings are also discussed.;Fourth, the user recognition rate is enhanced by adopting a group of keystroke features that has been overlooked by the research community. The research is conducted in two folds. To begin with, a standalone analysis is performed to identify the potentials of a group of normally ignored features, namely, secondary features. The experimental result compares well with the results obtained from letter based features (primary features) by other researchers. And quality results are obtained with fewer data records. Then, a feature selection and fusion mechanism is designed to select and fuse the secondary features with primary features to further improve the recognition rate of the underlying machine learning algorithms. Our approach is evaluated using our previously generated dataset and the result is better than the current state-of-the-art.;Fifth, the robustness of continuous authentication using keystroke dynamics under synthetic forgery attacks is studied. It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some users may have trouble authenticating, while others may be particularly vulnerable to impersonation. In this research, a mechanism is designed to select certain type of users from a large keystroke dataset. With their data, a master key is forged to attack the existing keystroke authentication system. The attacks are launched under both zero-effort as well as non-zero effort scenarios. Our initial results indicate that in the wake of the proposed synthetic impostor attack, the recognition ability of the keystroke authentication system can be weakened.
机译:验证计算机或网络用户的标准方法通常会在首次登录时发生一次,该方法存在多种漏洞,例如伪装和潜在的系统危害。解决此一次性身份验证问题的有效方法是使用行为生物识别技术进行连续身份验证。监视用户的击键动态是连续身份验证的有用机制。研究人员采用了各种方法来收集和使用按键动力学。然而,隐私问题,足够大的数据集无法进行评估,方法的可靠性和可扩展性以及方法的鲁棒性仍未得到很好的解决,这是本文的研究重点。进行连续验证的按键动力学方法的安全性和保密性。开发了基于规则的数据清理方案,以从收集的数据集中检测并删除个人可识别信息和其他敏感信息。实现了一种使用可扩展消息和状态协议(XMPP)的数据传输方案,以确保传输期间的隐私。基于这两种方案,提出了两种不同的体系结构,可为连续身份验证提供安全和隐私保护的数据处理支持。这些体系结构根据应用程序环境提供了使用灵活性。第二,已经生成了最大的可公开访问的连续身份验证击键数据集。在这项研究中,提供了有关用于按键动态研究的共享数据集的详细信息。原始的击键数据来自301位受试者,使他们能够转录固定文本并自由回答问题。该数据集的特征在于反映打字模式的时间变化以及由不同键盘布局引起的扰动。第三,探讨了作为认证机制的主题数目对按键动态性能,可靠性和可伸缩性的影响。使用我们先前生成的大型自由文本数据集,使用两种标准分类算法对291个主题进行了三组实验。通过系统地改变主题的数量和打字简档的大小,发现是:1)当涉及的主题数量非常高时,击键认证系统仍可以达到良好的分类率; 2)表现与一定阈值后的受试者人数无关。还讨论了我们的发现的实际含义。第四,通过采用一组被研究界忽视的按键功能,提高了用户识别率。该研究分两个方面进行。首先,执行独立分析以识别一组通常被忽略的特征(即次要特征)的潜力。实验结果与其他研究人员从基于字母的特征(主要特征)获得的结果进行了比较。并以较少的数据记录获得质量结果。然后,设计一种特征选择和融合机制,以选择次要特征并将其与主要特征融合,以进一步提高基础机器学习算法的识别率。我们的方法是使用我们先前生成的数据集进行评估的,其结果要优于当前的最新技术。第五,研究了在合成伪造攻击下使用击键动态进行连续认证的鲁棒性。人们普遍认为生物识别系统的用户在系统内可能具有不同的准确性。一些用户可能无法进行身份验证,而另一些用户可能特别容易受到模仿。在这项研究中,设计了一种机制来从大型击键数据集中选择某些类型的用户。利用他们的数据,伪造一个主密钥来攻击现有的击键身份验证系统。这些攻击是在零努力和非零努力情况下发起的。我们的初步结果表明,在提出的合成冒名顶替者攻击之后,按键身份验证系统的识别能力可能会减弱。

著录项

  • 作者

    Sun, Yan.;

  • 作者单位

    State University of New York at Buffalo.;

  • 授予单位 State University of New York at Buffalo.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2018
  • 页码 103 p.
  • 总页数 103
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号