A Novel Non-Linear Transformation Based Multi User Identification Algorithm for Fixed Text Keystroke Behavioral Dynamics
نویسندگان
چکیده
In this paper, we propose a new technique to uniquely classify and identify multiple users accessing single application using keystroke dynamics. This problem is usually encountered when have legitimate access shared computers accounts, where, at times, one user can inadvertently be logged in on another user’s account. Since the login processes are bypassed stage, rely dynamics order tell apart. Our algorithm uses quantile transform techniques from localization users. Specifically, use an known as ordinal Unfolding based Localization (UNLOC), which only data obtained comparing distance proxies, by “locating” reduced PCA/Kernel-PCA/t-SNE space their typing patterns. results validated with help of benchmark datasets show that our outperforms other methods.
منابع مشابه
User Identification at Logon via Keystroke Dynamics
Main goal of information system security is to protect the information by preventing unauthorized users to log on system and provide to log on system only authorized users. For this goal, it is necessary to distinguish the authorized and unauthorized users. In this study, a security method, which doesn’t require an extra hardware, was designed according to this goal. Also this system makes diff...
متن کاملMulti-Level User Authentication via Keystroke Dynamics
Behaviour biometric can provide a better alternative for traditional password methods and also for physiological biometrics due to the fact that they are very economical and easy to integrate with existing system. Various approaches have been made towards enhancing and improving the performance of keystroke dynamics system. The aim of writing this paper is to deal with all the possible uncertai...
متن کاملa new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
15 صفحه اولSequential Keystroke Behavioral Biometrics for Mobile User Identification via Multi-view Deep Learning
With the rapid growth in smartphone usage, more organizations begin to focus on providing better services for mobile users. User identification can help these organizations to identify their customers and then cater services that have been customized for them. Currently, the use of cookies is the most common form to identify users. However, cookies are not easily transportable (e.g., when a use...
متن کاملKeystroke-Based User Identification on Smart Phones
Smart phones are now being used to store users’ identities and sensitive information/data. Therefore, it is important to authenticate legitimate users of a smart phone and to block imposters. In this paper, we demonstrate that keystroke dynamics of a smart phone user can be translated into a viable features’ set for accurate user identification. To this end, we collect and analyze keystroke dat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE transactions on biometrics, behavior, and identity science
سال: 2023
ISSN: ['2637-6407']
DOI: https://doi.org/10.1109/tbiom.2022.3212958