2022
DOI: 10.1134/s0361768822060044
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Monitoring Based on Keystroke Dynamics in Online Examination System

Abstract: The COVID-19 pandemic has accelerated the development of distance learning technologies, where online tests and exams play an important role. In online testing, the detection of various types of academic fraud, including cases where the examinee is falsely represented by another person, is of particular importance. Continuous biometric (behavioral) authentication can be a solution to counter unauthorized access. This paper proposes an authentication technology based on keystroke dynamics and hidden monitoring.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 43 publications
0
1
0
Order By: Relevance
“…The evaluation of accuracy and performance in free-text keystroke dynamics is an ongoing area of investigation; researchers are actively developing methods to minimize error rates in this domain [46], while other researchers have explored the application of cGAN networks to generate fake keystroke dynamics patterns with the intention of deceiving keystroke-authentication systems [47]. Given the growing need for remote learning, continuous authentication with keystroke dynamics was implemented and performed very effectively [48], although keystroke dynamics has significant inaccuracies when applied to RDP (remote desktop protocol) and VNC (virtual network computing) systems, resulting in poor or non-functioning operation.…”
Section: Keystroke Dynamics and Its Circumventionmentioning
confidence: 99%
“…The evaluation of accuracy and performance in free-text keystroke dynamics is an ongoing area of investigation; researchers are actively developing methods to minimize error rates in this domain [46], while other researchers have explored the application of cGAN networks to generate fake keystroke dynamics patterns with the intention of deceiving keystroke-authentication systems [47]. Given the growing need for remote learning, continuous authentication with keystroke dynamics was implemented and performed very effectively [48], although keystroke dynamics has significant inaccuracies when applied to RDP (remote desktop protocol) and VNC (virtual network computing) systems, resulting in poor or non-functioning operation.…”
Section: Keystroke Dynamics and Its Circumventionmentioning
confidence: 99%