We examine the problem of user authentication from keystroke dynamics. A new static authentication method that collects information about user keystrokes is described. Its applicability to the authentication problem is substantiated by experiments and the optimal conditions for the implementation of the method are chosen.In most modern information systems, one of the main issues, alongside with data storage and processing, is the granting of access permissions. Permissions prevent unauthorized access by outsiders and also differentiate between the access rights of staff members within the organization. The authentication problem, i.e., verifying the legitimacy of the user seeking to access the system, is thus one of the key problems in information systems.Various methods are available to solve this problem. The most popular technique used in modern information system is password authentication -authentication by a special string of symbols known only to the user who has permission to access the system. In addition to obvious advantages -passwords are simple to implement and their use is very widespread, password authentication suffers from essential shortcomings: the user may forget the code string or reveal it to other users; if the password is too short or too simple, it can be found by direct enumeration or by dictionary-based enumeration. All this casts serious doubts on password use in high-security systems.Authentication by means of electronic and digital signatures (EDS) is free from the last shortcoming [1]. However, it is impossible to ensure secure storage of closed keys in this way, because they are stored using other access control tools.For these reasons, many effective security systems rely on biometrics to identify the user. Biometric systems fall in two categories. One category includes systems using features that differ for natural reasons among different individuals: fingerprints, retina scans, voice patterns, body temperature chart, etc. These systems are effective but quite costly because they require special equipment. The second category includes systems that analyze user behavior; they are based on user experience and skills. They do not require any special equipment and are simple to introduce. One of such systems analyzes user keystroke dynamics.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.