2004 IEEE International Conference on Industrial Technology, 2004. IEEE ICIT '04.
DOI: 10.1109/icit.2004.1490798
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic keystroke analysis using AR model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
14
0

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…As for the keystroke dynamics, they refer to the typing habits that cannot be easily imitated by other people; in consequence, the KDA system can utilize the time differences of keystroke time to judge and verify whether the user is a legitimate user or impostor. In the past relevant studies with regard to keystroke authentication, the researchers collect diverse keystroke time of typing fixedtext usernames or passwords as the characteristics [13,14] and then distinguish legitimate users from impostors by means of K-nearest-neighbor (KNN), statistical classifier [5], neural networks [15], sorting [16], and fuzzy inference [17] methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As for the keystroke dynamics, they refer to the typing habits that cannot be easily imitated by other people; in consequence, the KDA system can utilize the time differences of keystroke time to judge and verify whether the user is a legitimate user or impostor. In the past relevant studies with regard to keystroke authentication, the researchers collect diverse keystroke time of typing fixedtext usernames or passwords as the characteristics [13,14] and then distinguish legitimate users from impostors by means of K-nearest-neighbor (KNN), statistical classifier [5], neural networks [15], sorting [16], and fuzzy inference [17] methods.…”
Section: Introductionmentioning
confidence: 99%
“…PR denotes the time period between the press and the release of the same key on a keyboard; PP denotes the time period between the press of one key and the press of another key; RP denotes the time period between the release of one key and the press of another key; and RR denotes the time period between the release of one key and the release of another key. As for the past studies regarding keystroke authentication, most of them took the four time periods PR, RP, RR, and PP produced when the user entered the fixed-text usernames and passwords as the resources of the authentication [5,6,13,22] Moreover, in the authentication phase, lots of works proposed a variety of methods to distinguish legitimate users from impostors by means of KNN, statistical [5], neural networks [15], sorting [16], and fuzzy inference [17] methods. According to the research results reported by Boechat et al [23], they mentioned that the statistical classifier has the following characteristics such as simplification, speed, low-burden calculation, and the accuracy of identification as others.…”
Section: Introductionmentioning
confidence: 99%
“…The algorithms span a vast range of families: basic statistical features789, Bayesian analysis1011, autoregressive models12, hidden Markov models1314, artificial neural networks1516 and other machine learning techniques1718. Each of these approaches is employed to grant or deny access to a computer system, hence, a primary requirement is the reliance on a small number of key presses in order to avoid excessive burden on the user who needs to access the system.…”
mentioning
confidence: 99%
“…Auto-regressive (AR) and AR moving-average (ARMA) models were considered with and without measures of pressure (Changshui and Yanhua, 2000; Eltahir et al, 2004). Hidden Markov models (HMMs) have been implemented (Chang, 2005) with a similarity histogram, and, by attempting to recognize patterns, produce promising results.…”
Section: Keystroke Dynamics For Securitymentioning
confidence: 99%
“…The most applicable and investigated addition was that of keystroke pressure. Measures of pressure were achieved by making use of piezo-electric and piezo-resistive sensors interfaced with the computer system to which the active keyboard was connected (Eltahir et al, 2003, 2004; Nonaka and Kurihara, 2004). These sensors were either placed beneath specific (or all) keys (Eltahir et al, 2003, 2004) or upon the support sections of the keyboard (Nonaka and Kurihara, 2004).…”
Section: Keystroke Dynamics For Securitymentioning
confidence: 99%