期刊文献+

基于Levenberg-Marquardt算法的用户鉴别 被引量:8

The Authentication of the Computer Users Based on Levenberg-Marquardt Algorithm
在线阅读 下载PDF
导出
摘要 为了维护计算机系统的安全,一般通过设置用户口令以便进行身份鉴别,防止他人冒名顶替.口令鉴别的主要弱点在于,一旦被窃,冒名顶替者就可以轻而易举地进入用户的私人账户进行非法活动.击键动力学的研究是给口令加上一个简便而有效的保护措施.击键动力学方法通过获取并分析用户敲击键盘的特征数据,自动地识别出用户的真实身份.这一辅助身份鉴别的关键问题主要是寻找准确率高、执行速度快的识别算法.本论文采用Levenberg-Marquardt(LM)算法对上述存在的问题进行了研究. In order to protect computer system, password is the most widely used method to control the access of computer system by authenticating the users′ identity. However, the policy of password is vulnerable to impostor attacks due to its simplicity. Therefore, the original intention of keystroke dynamics is to provide a convenient and effective protection on password verification. In keystroke dynamics, the characteristics of a user′ keystrokes is captured when password is being typed, and is analyzed by algorithms to automatically recognize the authentic identity. What is critical for such an auxiliary identity authentication is to find a recognition algorithm with high accuracy and high speed. In this thesis, these problems are explored in depth, and Levenberg-Marquardt algorithm is adopted for data analysis.
作者 王琛
出处 《山西师范大学学报(自然科学版)》 2005年第2期17-20,共4页 Journal of Shanxi Normal University(Natural Science Edition)
  • 相关文献

参考文献8

  • 1Miller B. Vital Signs of Identity (Biometrics) [ J ]. IEEE Spectrum, 1994, ,31 (2) :22 - 30.
  • 2Monrose F, Rubin A. Authentication via Keystroke Dynamics [ J ]. Proceedings of the Fourth ACM Conference on Computer and Communications Security, 1997,4:48 ~56.
  • 3Monrose F, Rubin A. Keystroke Dynamics as a Biometric for Authentication [J]. Future Generation Computer Systems, 2000, Vol. 16 (4): 351-359.
  • 4Zhang C S, Sun Y H. AR Model for Keystroke Verification[J]. IEEE International Conference on Systems, Man, and Cybernetics,2000,4:2887~ 2890.
  • 5Obaidat M S, Sadoun B. Keystroke Dynamics based Authentication. Biometrics Personal Identification in Networked Society [ M ]. Kluwer Academic Publishers, 1998:213 ~ 225.
  • 6刘学军,陈松灿,彭宏京.基于支持向量机的计算机键盘用户身份验真[J].计算机研究与发展,2002,39(9):1082-1086. 被引量:26
  • 7朱明,周津,王继康.基于击键特征的用户身份认证新方法[J].计算机工程,2002,28(10):138-139. 被引量:13
  • 8Lin D T. Computer - access Authentication with Neural Network based Keystroke Identity Verification [ J ]. International Conference on Neural Networks, 1997,1:174 ~ 178.

二级参考文献4

  • 1[1]Monrose F,Rubin A D.Keystroke Dynamics as a Biometric for Au thentication.Future Generation Computing Systems (FGCS) Journal:Security on the Web (Special Issue),2000-03:341-345
  • 2[2]Monrose F,Reiter M K,Wetzel S.Password Hardening Based on Keystroke Dynamics.In:Proceedings of the 6th ACM Conference on Computer and Communication Security, 1999-11:26-32
  • 3[3]Robinson J A,Liang V M,Chambers J A M,et al.Computer User Verification Using Login String Keystroke Dynamics. IEEE Transactions on Systems, Ma n,and Cybernetics,part A, 1998,28(2):63-70
  • 4赵海波,李建华,杨宇航.网络入侵智能化实时检测系统[J].上海交通大学学报,1999,33(1):76-79. 被引量:37

共引文献34

同被引文献62

引证文献8

二级引证文献80

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部