期刊文献+

基于行为特征识别的网络诈骗嫌疑人追踪系统 被引量:6

Network Fraud Suspects Tracking System based on Behavioral Biometric Identifi cation
在线阅读 下载PDF
导出
摘要 在互联网日益发展的今天,网络诈骗随时随处都在发生,犯罪嫌疑人的身份极难识别,给网络诈骗案件的侦破带来了困难。文章以即时聊天工具QQ为例,对网络诈骗嫌疑人身份识别及追踪给出一个完整的解决方案。文章的思路是通过行为特征来进行嫌疑人的身份识别,行为特征指不同人的击键特征,能够高精准地区分不同的人,而且键盘普及率很高,这给系统运行提供了硬件环境。在系统中,文章通过监听用户键盘击键进行击键特征提取,并且引入本地验证和服务器验证对用户进行身份识别,通过IP对疑犯进行定位,从而协助执法人员进行网络诈骗案件的侦查。 In the increasing development of the lntemet today, Internet frauds happen everywhere and anytime, to identify the suspect is so difficult that detect network bilk case brings difficulty. This project takes the instant chat tool QQ for example and gives a complete solution for the Internet fraud detection. Through the behavior features of suspects, the project can differentiate different people at the high precision, and keyboard popularity rate is very high, which provides hardware environment for the system operation. In the system, this project extracts keystroke feature by monitoring users' keystrokes, and introduces the local authentication and server authentication to identify users. After positioning for the suspects through the IP, the system assist the police to investigate network fraud cases.
出处 《信息网络安全》 2014年第1期65-70,共6页 Netinfo Security
基金 "十二五"国家科技支撑计划[2012BAH38B05]
关键词 键盘 特征提取 身份识别 网络诈骗 定位 keyboard feature extraction identification fraud of network location
  • 相关文献

参考文献4

二级参考文献25

  • 1WOOD J D.生物认证[M].陈菊明,邓启威,等译.北京:清华大学出版社,2004.
  • 2ULUDAG U, PANKANTI S, PRABHAKAR S, et al. Biometric cryptosystems: Issues and challenges[ C]// Proceedings of IEEE Conference on Multimedia Information Retrieval. [ S. l. ]: IEEE Press, 2004:948 - 960.
  • 3SUTCU Y, QIMING L, MEMON N. Protecting biometric templates with sketch: Theory and practice[ J]. IEEE Transactions on Information Forensics and Security, 2007, 2(3) : 503 - 512.
  • 4KACHOLIA V, PANDIT S. Biometric authentication using random distributions[ C/OL]. [ 2009 - 01 -01 ]. http://shashankpandit. com/papers/bioart/paper. pdf.
  • 5[1]Bacel Rebecca, Mell2 Peter. Intrusion Detection Systems. NIST Special Publication, 2000
  • 6[2]Monrose F., Rubin A.D.. Keystroke dynamics as a biometric for authentication. Future Generation Computer Systems, 2000,(16): 351~359
  • 7[3]Gaines R., Lisowski W., Press S.. Authentication by keystroke timing: some preliminary results. Rand Corporation: Rand Report R-2560-NSF, 1980
  • 8[4]Leggett J., Williams G., Usnick J.. Dynamic identity verification via keystroke characteristics. International Journal of Man-Machine Studies, 1991 ,(35): 859~870
  • 9[5]Napier R., Laberty W., Mahar W.. Keyboard user verification: Toward an accurate, efficient, and ecologically valid algorithm. International Journal of Human-Computer Studies, 1995,(43): 213~222
  • 10[6]Obaidat M.S., Sadoun Balqies. Verification of computer users using keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics, 1997, 27(2): 261~269

共引文献32

同被引文献75

  • 1史扬,曹立明.基于击键特征的用户身份校验[J].计算机工程,2005,31(6):120-122. 被引量:8
  • 2张玉安,冯登国.一种实用的仿一次一密分组加密方案[J].北京邮电大学学报,2005,28(2):101-104. 被引量:16
  • 3杜建超,吴成柯,杨亚东,肖嵩.一种基于图像内容的数据分割方法[J].西安电子科技大学学报,2006,33(2):200-204. 被引量:2
  • 4覃政仁,吴渝,王国胤.一种基于RoughSet的海量数据分割算法[J].模式识别与人工智能,2006,19(2):249-256. 被引量:7
  • 5习近平.习近平在中央政法工作会议上的讲话[N].人民日报,2014-1—9.
  • 6迈尔·舍恩伯格,库克耶大数据时代[M].盛阳燕,周涛译.杭州:浙江人民出版社,2013.
  • 7MellP, Grance T. The NIST definition of cloud computing (draft)[J].NIST special publication, 2011, 800(145):7-12.
  • 8ClarkB, Deshane T, Dow E M, et al. Xen and the Art of RepeatedResearch[C]//USENIX Annual Technical Conference, FPJEENIX Track.2004: 135-144.
  • 9KVM.Kernel based virtual machine[EB/OL] http://www.linux-kvm.org/page/Main一Page,2014-9-11.
  • 10PayneB D, De Carbone M D P, Lee W. Secure and flexible monitoringof virtual machines[C]//Computer Security Applications Conference,2007. ACSAC 2007. Twenty-Third Annual. IEEE, 2007: 385-397.

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部