基于模糊逻辑的按键动力学认证

Jatin Yadav, Kavita Pandey, Shashank Gupta, Richa Sharma
{"title":"基于模糊逻辑的按键动力学认证","authors":"Jatin Yadav, Kavita Pandey, Shashank Gupta, Richa Sharma","doi":"10.1109/IC3.2017.8284338","DOIUrl":null,"url":null,"abstract":"With online information thefts increasing every day, enhanced user authentication systems have become a necessity. This is due to the fact that current authentication systems have certain weaknesses, such as the username used for login is easily known to anyone and password can be guessed or forcibly retrieved. This paper focuses on overcoming these weaknesses by recognizing users based on their typing patterns. This technique which is used to uniquely label users based on their typing rhythm is known as keystroke dynamics. In an authentication system employing keystroke dynamics, samples provided by the users during the initial sign up phase are used to generate a template for the future authentication. This template is regularly updated whenever the user is correctly identified. The work proposed in this paper focuses on implementing a keystroke dynamics based authentication system using fuzzy logic. It also discusses how a fuzzy logic approach is beneficial as compared to other approaches implemented previously, and how a continuous learning model improves accuracy over time. The proposed fuzzy logic model gives 98% authentication accuracy and 2% false rejection rate.","PeriodicalId":147099,"journal":{"name":"2017 Tenth International Conference on Contemporary Computing (IC3)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Keystroke dynamics based authentication using fuzzy logic\",\"authors\":\"Jatin Yadav, Kavita Pandey, Shashank Gupta, Richa Sharma\",\"doi\":\"10.1109/IC3.2017.8284338\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With online information thefts increasing every day, enhanced user authentication systems have become a necessity. This is due to the fact that current authentication systems have certain weaknesses, such as the username used for login is easily known to anyone and password can be guessed or forcibly retrieved. This paper focuses on overcoming these weaknesses by recognizing users based on their typing patterns. This technique which is used to uniquely label users based on their typing rhythm is known as keystroke dynamics. In an authentication system employing keystroke dynamics, samples provided by the users during the initial sign up phase are used to generate a template for the future authentication. This template is regularly updated whenever the user is correctly identified. The work proposed in this paper focuses on implementing a keystroke dynamics based authentication system using fuzzy logic. It also discusses how a fuzzy logic approach is beneficial as compared to other approaches implemented previously, and how a continuous learning model improves accuracy over time. The proposed fuzzy logic model gives 98% authentication accuracy and 2% false rejection rate.\",\"PeriodicalId\":147099,\"journal\":{\"name\":\"2017 Tenth International Conference on Contemporary Computing (IC3)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Tenth International Conference on Contemporary Computing (IC3)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IC3.2017.8284338\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Tenth International Conference on Contemporary Computing (IC3)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3.2017.8284338","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

随着网络信息盗窃日益增多,增强的用户认证系统已成为一种必要。这是由于当前的身份验证系统存在某些弱点,例如用于登录的用户名很容易被任何人知道,密码可以被猜测或强制检索。本文的重点是通过根据用户的输入模式来识别用户,从而克服这些弱点。这种根据用户的打字节奏对其进行唯一标记的技术被称为击键动力学。在使用击键动力学的身份验证系统中,用户在初始注册阶段提供的示例用于生成将来身份验证的模板。只要用户被正确识别,这个模板就会定期更新。本文提出的工作重点是利用模糊逻辑实现一个基于击键动力学的认证系统。它还讨论了与以前实现的其他方法相比,模糊逻辑方法是如何有益的,以及持续学习模型如何随着时间的推移提高准确性。所提出的模糊逻辑模型具有98%的认证准确率和2%的误拒率。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Keystroke dynamics based authentication using fuzzy logic
With online information thefts increasing every day, enhanced user authentication systems have become a necessity. This is due to the fact that current authentication systems have certain weaknesses, such as the username used for login is easily known to anyone and password can be guessed or forcibly retrieved. This paper focuses on overcoming these weaknesses by recognizing users based on their typing patterns. This technique which is used to uniquely label users based on their typing rhythm is known as keystroke dynamics. In an authentication system employing keystroke dynamics, samples provided by the users during the initial sign up phase are used to generate a template for the future authentication. This template is regularly updated whenever the user is correctly identified. The work proposed in this paper focuses on implementing a keystroke dynamics based authentication system using fuzzy logic. It also discusses how a fuzzy logic approach is beneficial as compared to other approaches implemented previously, and how a continuous learning model improves accuracy over time. The proposed fuzzy logic model gives 98% authentication accuracy and 2% false rejection rate.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Clickstream & behavioral analysis with context awareness for e-commercial applications Clustering based minimum spanning tree algorithm Sarcasm detection of tweets: A comparative study Quantum genetic algorithm with rotation angle refinement for dependent task scheduling on distributed systems An approach to maintain attendance using image processing techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1