{"title":"基于深度神经网络的连续用户认证","authors":"A. T. Kiyani, A. Lasebae, Kamran Ali","doi":"10.1109/UCET51115.2020.9205446","DOIUrl":null,"url":null,"abstract":"A user authentication method consists of a username, password, or any other related credential. These methods are mostly used only once to validate the user’s identity at the start of session. However, one-time verification of user’s identity is not resilient enough to provide adequate security all over the session. Such authentication methods should be adopted which can continuously verify that only genuine user is using the system resources for entire session. This research work has implemented a true continuous authentication system, based on keystroke dynamics, which tends to validate the user on each action by using the proposed robust recurrent confidence model(R-RCM). Moreover, the recurrent neural network(RNN) has been used to exploit the sequential nature of keystroke data. System has been tested with two experimental approaches and results are reported in mean genuine actions (ANGA) and imposter actions (ANIA).","PeriodicalId":163493,"journal":{"name":"2020 International Conference on UK-China Emerging Technologies (UCET)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Continuous User Authentication Based on Deep Neural Networks\",\"authors\":\"A. T. Kiyani, A. Lasebae, Kamran Ali\",\"doi\":\"10.1109/UCET51115.2020.9205446\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A user authentication method consists of a username, password, or any other related credential. These methods are mostly used only once to validate the user’s identity at the start of session. However, one-time verification of user’s identity is not resilient enough to provide adequate security all over the session. Such authentication methods should be adopted which can continuously verify that only genuine user is using the system resources for entire session. This research work has implemented a true continuous authentication system, based on keystroke dynamics, which tends to validate the user on each action by using the proposed robust recurrent confidence model(R-RCM). Moreover, the recurrent neural network(RNN) has been used to exploit the sequential nature of keystroke data. System has been tested with two experimental approaches and results are reported in mean genuine actions (ANGA) and imposter actions (ANIA).\",\"PeriodicalId\":163493,\"journal\":{\"name\":\"2020 International Conference on UK-China Emerging Technologies (UCET)\",\"volume\":\"122 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Conference on UK-China Emerging Technologies (UCET)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/UCET51115.2020.9205446\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference on UK-China Emerging Technologies (UCET)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/UCET51115.2020.9205446","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Continuous User Authentication Based on Deep Neural Networks
A user authentication method consists of a username, password, or any other related credential. These methods are mostly used only once to validate the user’s identity at the start of session. However, one-time verification of user’s identity is not resilient enough to provide adequate security all over the session. Such authentication methods should be adopted which can continuously verify that only genuine user is using the system resources for entire session. This research work has implemented a true continuous authentication system, based on keystroke dynamics, which tends to validate the user on each action by using the proposed robust recurrent confidence model(R-RCM). Moreover, the recurrent neural network(RNN) has been used to exploit the sequential nature of keystroke data. System has been tested with two experimental approaches and results are reported in mean genuine actions (ANGA) and imposter actions (ANIA).