You are here

USER IDENTIFICATION AT LOGON VIA KEYSTROKE DYNAMICS

Journal Name:

Publication Year:

Abstract (2. Language): 
Main goal of information system security is to protect the information by preventing unauthorized users to log on system and provide to log on system only authorized users. For this goal, it is necessary to distinguish the authorized and unauthorized users. In this study, a security method, which doesn’t require an extra hardware, was designed according to this goal. Also this system makes difficult to system logon even if the password is known by the hypothesis of distinguishing users according to their typing rhythms is possible.
995-1005

REFERENCES

References: 

[1] GAINES, R.S.& LISOWSKI, W. & PRESS. S. J.& SHAPIRO, N. “Authentication by Keystroke Timing: Some Preliminary Results”, Rand Report R-256-NSF, Rand Corporation. 1980.
[2] BLEHA, S. “Recognition Systems Based on Keystroke Dynamics”, Ph.D. Dissertation, University of Missouri-Colombia, 1988..
[3] BLEHA, S. & SLIVINSKY, C.& HUSSEIN, B. “Computer-Access Security Systems using Keystroke Dynamics”. IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.12, No.12, 1990.
[4] UMPHRESS, D. & WILLIAMS, G. “Identity Verification Through Keyboard Characteristics” International Journal of Man-Machine Studies, 23(3): pp:263-273. ,1985.
[5] LEGGETT, J. & WILLIAMS, G. “Verifying Identity Keystroke Characteristics”, International Journal of Man-Machine Studies, 28(1): pp:67-76, .1978.
[6] LEGGETT, J. & WILLIAMS, G. & UMPHRESS, D, “Verification of User Identity via Keystroke Characteristics”, Human Factors in Management Information Systems. 1989,.
[7] JOYCE, R. & GUPTA, G. “Identity Authorization Based on Keystroke Latencies”, Communications of the ACM, 33(2), pp:168-176, 1990.
[8] MONROSE, F. & RUBIN, A. D., “Authentication via Keystroke Dynamics”, Fourth ACM Conference on Computer and Communications Security, pp:48-56, 1997.
[9] SONG, D. X. & WAGNER, D. & TIAN, X., “Timing Analysis of Keystrokes and Timing Attacks on SSH”,http://paris.cs.berkeley.edu/~dawnsong/papers/ssh-timing.pdf, 2001.
[10] CHO, S. & HAN, C. & HAN, D. H. & KIM, H., “Web Based Keystroke Dynamics Identity Verification using Neural Network”, Journal of Organizational Computing and Electronic Commerce, Vol. 10, No. 4, pp. 295-307, 2000.
[11] PEACOCK, A., “Learning User Keystroke Latency Patterns”, (Preliminary Report), http:/ /pel.cs.byu.edu/~alen/personal/ CourseWork/cs572/KeystrokePaper.ps, 2000.
[12] GUVEN,A. & SOĞUKPINAR, İ. “Computer and Network Security System Design via Keystroke Dynamics”,. BAS2000, Ankara., 2000.
[13] MONROSE, F. & RUBIN, A. D., “Keystroke Dynamics as a Biometric for Authentication”, Future Generation Computing Systems (FGCS) Journal: Security on the Web (special issue). March 2000
[14] SONG, D. & VENABLE, P. & PERRIG, A. “User Recognition by Keystroke Latency Pattern Analysis”, http://paris.cs.berkeley.edu /~perrig/projects/keystroke,1997.

Thank you for copying data from http://www.arastirmax.com