期刊文献+

基于生物击键特性的访问控制 被引量:2

Access Control Based on Biologic Keystroke Characteristics
在线阅读 下载PDF
导出
摘要 访问控制在安全领域起着越来越重要的作用,个人的一些生物特征具有唯一性而且难以改变,利用这些特征识别用户身份,从而进行系统访问控制具有很强的优势。论文首先通过对人体生物击键特性的分析,阐述了基于生物击键特性的访问控制过程;然后对已有的击键序列识别算法进行分析,提出了一种新的自适应击键特性识别算法。该算法能够适应用户敲击键盘熟练程度的变化,并可防止输入过程中的个别“奇点”影响整体的识别效果。算法改进的讨论中,通过改变特征数据的存储结构使得用户修改密码后,算法仍然能够从历史数据中挖掘击键特性,提高学习效率。最后的测试结果和理论分析都表明该方法对于因密钥丢失导致的系统失控具有很好的防护作用。 Access control is playing a more and more important role in the secure systems.The biologic information of human is unique and unchangeable.So it has many advantages to indicate users in system.This paper firstly presents some details of human keystroke characteristics,then gives a basic framework of access control based on biologic keystroke characteristics.Following that,it analyzes algorithms on keystroke sequence,suggests a new self-adaptive algorithm,by which system can adjust parameters automatically according to the variety of the user's skill and get rid of the odd point in input.To improve the algorithm,a new structure is applied to record any useful data so that system can easily find the user's characteristics when he modifies his password.In the end,theory analysis and test results are both given to explain the validity of this method :even if password is stolen ,the attacker can hardly find how the owner types because of user's biometrics for keystroke.Hence this way can overcome the weak point of password checking schemes.
出处 《计算机工程与应用》 CSCD 北大核心 2005年第31期1-4,85,共5页 Computer Engineering and Applications
基金 国家自然科学基金(编号:90104025)
关键词 生物击键特性 访问控制 自适应 身份识别 信息安全 biologic keystroke characteristics, access control, adapt, personal identification, information security
  • 相关文献

参考文献11

  • 1Francisco J Gutierrez,Margarita M Lerma-Rascon et al. Biometrics and Data Mining:Comparison of Data Mining-Based Keystroke Dynamics Methods for Identity Verification[C].In:MICAI 2002,LNAI 2313,2002:460~469.
  • 2Enzhe Yu,Sungzoon Cho. Novelty detection approach for keystroke dynamics identity verification. IDEAL 2003,LNCS2690,2003:1016~1023.
  • 3Fabian Monrose, Michael K Reiter,SusanneWetzel. Password hardening based on keystroke dynamics. IJIS,2002;1:69~83.
  • 4Obaidat M S,Sadoun Balqies. Verification of computer users using keystroke dynamics[J].IEEE Transactions on Systems,Man,and Cybernetics, 1997; 27 (2): 261~269.
  • 5Kazumasa Omote,Eiji Okamoto. User Identication System Based on Biometrics for Keystroke[C].In: ICICS'99,LNCS 1726,1999: 216~229.
  • 6K Omote,E Okamoto. User Identication Schemes Using Biometrics of Key-stroke[C].In:Proceedings of CSS'98,1998:213~218.
  • 7S Cho,C Han,D Han et al. Web-based keystroke dynamics identity verification using neural network[J].Journal of organizational compu ting and electronic commerce,2000;10(4):295~307.
  • 8高艳,管晓宏,孙国基,冯力.基于实时击键序列的主机入侵检测[J].计算机学报,2004,27(3):396-401. 被引量:20
  • 9桑应朋,范平志,郝莉.基于Levenberg-Marquardt算法的用户击键特征鉴别[J].计算机应用,2004,24(7):108-109. 被引量:7
  • 10朱明,周津,王继康.基于击键特征的用户身份认证新方法[J].计算机工程,2002,28(10):138-139. 被引量:13

二级参考文献21

  • 1罗莉,罗强,胡守仁.前馈多层神经网络的一种优质高效学习算法[J].计算机研究与发展,1997,34(2):107-112. 被引量:38
  • 2胡守仁.神经网络导论[M].北京:国防科大出版社,1995.113.
  • 3[1]Monrose F,Rubin A D.Keystroke Dynamics as a Biometric for Au thentication.Future Generation Computing Systems (FGCS) Journal:Security on the Web (Special Issue),2000-03:341-345
  • 4[2]Monrose F,Reiter M K,Wetzel S.Password Hardening Based on Keystroke Dynamics.In:Proceedings of the 6th ACM Conference on Computer and Communication Security, 1999-11:26-32
  • 5[3]Robinson J A,Liang V M,Chambers J A M,et al.Computer User Verification Using Login String Keystroke Dynamics. IEEE Transactions on Systems, Ma n,and Cybernetics,part A, 1998,28(2):63-70
  • 6[1]Bacel Rebecca, Mell2 Peter. Intrusion Detection Systems. NIST Special Publication, 2000
  • 7[2]Monrose F., Rubin A.D.. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 2000,(16): 351~359
  • 8[3]Gaines R., Lisowski W., Press S.. Authentication by keystroke timing: some preliminary results. Rand Corporation: Rand Report R-2560-NSF, 1980
  • 9[4]Leggett J., Williams G., Usnick J.. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 1991 ,(35): 859~870
  • 10[5]Napier R., Laberty W., Mahar W.. Keyboard user verification: Toward an accurate, efficient, and ecologically valid algorithm. International Journal of Human-Computer Studies, 1995,(43): 213~222

共引文献37

同被引文献7

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部