語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Shared Keystroke Data for Continuous...
~
Sun, Yan.
FindBook
Google Book
Amazon
博客來
Shared Keystroke Data for Continuous Authentication - Generation and Analysis.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Shared Keystroke Data for Continuous Authentication - Generation and Analysis./
作者:
Sun, Yan.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2018,
面頁冊數:
103 p.
附註:
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
Contained By:
Dissertation Abstracts International79-08B(E).
標題:
Computer science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10744901
ISBN:
9780355680140
Shared Keystroke Data for Continuous Authentication - Generation and Analysis.
Sun, Yan.
Shared Keystroke Data for Continuous Authentication - Generation and Analysis.
- Ann Arbor : ProQuest Dissertations & Theses, 2018 - 103 p.
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
Thesis (Ph.D.)--State University of New York at Buffalo, 2018.
The standard methods to authenticate a computer or a network user, which typically occur once at the initial log-in, suffer from a variety of vulnerabilities such as masquerading and potential system compromise. An effective solution to this one-time authentication problem is the continuous authentication using behavioral biometrics. Monitoring of a user's keystroke dynamics is a useful mechanism for continuous authentication. Researchers have taken various approaches for the collection and use of keystroke dynamics. However, the privacy issue, the non-availability of large enough datasets for evaluation, the reliability and scalability, and the robustness of the methods are still not well addressed, which are the focus of this dissertation.
ISBN: 9780355680140Subjects--Topical Terms:
523869
Computer science.
Shared Keystroke Data for Continuous Authentication - Generation and Analysis.
LDR
:05346nmm a2200349 4500
001
2164625
005
20181116131020.5
008
190424s2018 ||||||||||||||||| ||eng d
020
$a
9780355680140
035
$a
(MiAaPQ)AAI10744901
035
$a
(MiAaPQ)buffalo:15616
035
$a
AAI10744901
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Sun, Yan.
$3
898947
245
1 0
$a
Shared Keystroke Data for Continuous Authentication - Generation and Analysis.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2018
300
$a
103 p.
500
$a
Source: Dissertation Abstracts International, Volume: 79-08(E), Section: B.
500
$a
Adviser: Shambhu Upadhyaya.
502
$a
Thesis (Ph.D.)--State University of New York at Buffalo, 2018.
520
$a
The standard methods to authenticate a computer or a network user, which typically occur once at the initial log-in, suffer from a variety of vulnerabilities such as masquerading and potential system compromise. An effective solution to this one-time authentication problem is the continuous authentication using behavioral biometrics. Monitoring of a user's keystroke dynamics is a useful mechanism for continuous authentication. Researchers have taken various approaches for the collection and use of keystroke dynamics. However, the privacy issue, the non-availability of large enough datasets for evaluation, the reliability and scalability, and the robustness of the methods are still not well addressed, which are the focus of this dissertation.
520
$a
First, a systematic study of the security and privacy of the keystroke dynamics approach to continuous authentication is conducted. A rule based data sanitization scheme is developed to detect and remove personally identifiable and other sensitive information from the collected dataset. A data transmission scheme using the Extensible Messaging and Presence Protocol (XMPP) is implemented to guarantee privacy during transmission. Based on these two schemes, two distinct architectures are proposed for providing secure and privacy preserving data processing support for continuous authentication. These architectures provide flexibility of use depending upon the application environment.
520
$a
Second, the largest publicly accessible keystroke dataset for continuous authentication has been generated. In this research, the details on the collection of a shared dataset for the study of keystroke dynamics are provided. The raw keystroke data was collected from 301 subjects allowing them to transcribe fixed text and answer questions freely. The dataset is characterized to reflect the temporal variations of typing patterns and the perturbations caused by different keyboard layouts.
520
$a
Third, the effect of the number of subjects on the performance and the reliability and scalability of the keystroke dynamics as the authentication mechanism are explored. Three sets of experiments are conducted with the use of our previously generated large free-text dataset with 291 subjects using two standard classification algorithms. By systematically varying the number of subjects and the size of the typing profile, the findings are: 1) the keystroke authentication system can still achieve a good classification rate when the number of subjects involved is significantly high; 2) the performance is independent of the number of subjects after a certain threshold. The practical implication of our findings are also discussed.
520
$a
Fourth, the user recognition rate is enhanced by adopting a group of keystroke features that has been overlooked by the research community. The research is conducted in two folds. To begin with, a standalone analysis is performed to identify the potentials of a group of normally ignored features, namely, secondary features. The experimental result compares well with the results obtained from letter based features (primary features) by other researchers. And quality results are obtained with fewer data records. Then, a feature selection and fusion mechanism is designed to select and fuse the secondary features with primary features to further improve the recognition rate of the underlying machine learning algorithms. Our approach is evaluated using our previously generated dataset and the result is better than the current state-of-the-art.
520
$a
Fifth, the robustness of continuous authentication using keystroke dynamics under synthetic forgery attacks is studied. It is commonly accepted that users of a biometric system may have differing degrees of accuracy within the system. Some users may have trouble authenticating, while others may be particularly vulnerable to impersonation. In this research, a mechanism is designed to select certain type of users from a large keystroke dataset. With their data, a master key is forged to attack the existing keystroke authentication system. The attacks are launched under both zero-effort as well as non-zero effort scenarios. Our initial results indicate that in the wake of the proposed synthetic impostor attack, the recognition ability of the keystroke authentication system can be weakened.
590
$a
School code: 0656.
650
4
$a
Computer science.
$3
523869
690
$a
0984
710
2
$a
State University of New York at Buffalo.
$b
Computer Science and Engineering.
$3
1035503
773
0
$t
Dissertation Abstracts International
$g
79-08B(E).
790
$a
0656
791
$a
Ph.D.
792
$a
2018
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10744901
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9364172
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入