Academic Journal
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
العنوان: | Double serial adaptation mechanism for keystroke dynamics authentication based on a single password |
---|---|
المؤلفون: | Mhenni, Abir, Cherrier, Estelle, Rosenberger, Christophe, Essoukri Ben Amara, Najoua |
المساهمون: | Equipe SAFE - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS), Laboratory of Advanced Technology and Intelligent Systems (LATIS), National Engineering School of Sousse / Ecole Nationale d'Ingénieurs de Sousse (ENISo), Université de Sousse-Université de Sousse, Ecole Nationale d'Ingénieurs de Tunis (ENIT), Université de Tunis El Manar (UTM) |
المصدر: | ISSN: 0167-4048 ; Computers & Security ; https://hal.science/hal-02050175 ; Computers & Security, 2019, 83, pp.151-166. ⟨10.1016/j.cose.2019.02.002⟩. |
بيانات النشر: | HAL CCSD Elsevier |
سنة النشر: | 2019 |
المجموعة: | Normandie Université: HAL |
مصطلحات موضوعية: | Biometric authentication, Online classification, Template aging, Adaptive strategy, Keystroke dynamics, Template update, Adapted thresholds, KNN-GA, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] |
الوصف: | International audience ; Cyber-attacks have spread all over the world to steal information such as trade secrets, intellectual property and banking data. Facing the danger of the insecurity of saved data (personal, professional, official, etc.), keystroke dynamics was proposed as an interesting, non-intrusive, inexpensive, permanent and weakly constrained solution for users. Based on the typing rhythm of users, it improves logical access security. Nevertheless, it was demonstrated that such an authentication mechanism would need a larger number of samples to enroll the typing characteristics of users. Moreover, these registered characteristics generally undergo aging effects after a time span. Different solutions have been suggested to remedy these variability problems, including template adaptation. In this paper, we propose a double serial adaptation strategy that considers a single-capture-based enrollment process. When using the authentication system, the template of users and the decision/adaptation thresholds are updated. Experimental results on three public keystroke dynamics datasets show the benefits of the proposed method. |
نوع الوثيقة: | article in journal/newspaper |
اللغة: | English |
Relation: | hal-02050175; https://hal.science/hal-02050175; https://hal.science/hal-02050175/document; https://hal.science/hal-02050175/file/S0167404818306059.pdf; PII: S0167-4048(18)30605-9 |
DOI: | 10.1016/j.cose.2019.02.002 |
الاتاحة: | https://hal.science/hal-02050175 https://hal.science/hal-02050175/document https://hal.science/hal-02050175/file/S0167404818306059.pdf https://doi.org/10.1016/j.cose.2019.02.002 |
Rights: | http://creativecommons.org/licenses/by-nc/ ; info:eu-repo/semantics/OpenAccess |
رقم الانضمام: | edsbas.BCE83D62 |
قاعدة البيانات: | BASE |
ResultId |
1 |
---|---|
Header |
edsbas BASE edsbas.BCE83D62 893 3 Academic Journal academicJournal 892.664306640625 |
PLink |
https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsbas&AN=edsbas.BCE83D62&custid=s6537998&authtype=sso |
FullText |
Array
(
[Availability] => 0
)
Array ( [0] => Array ( [Url] => https://hal.science/hal-02050175# [Name] => EDS - BASE [Category] => fullText [Text] => View record in BASE [MouseOverText] => View record in BASE ) ) |
Items |
Array
(
[Name] => Title
[Label] => Title
[Group] => Ti
[Data] => Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
)
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Mhenni%2C+Abir%22">Mhenni, Abir</searchLink><br /><searchLink fieldCode="AR" term="%22Cherrier%2C+Estelle%22">Cherrier, Estelle</searchLink><br /><searchLink fieldCode="AR" term="%22Rosenberger%2C+Christophe%22">Rosenberger, Christophe</searchLink><br /><searchLink fieldCode="AR" term="%22Essoukri+Ben+Amara%2C+Najoua%22">Essoukri Ben Amara, Najoua</searchLink> ) Array ( [Name] => Author [Label] => Contributors [Group] => Au [Data] => Equipe SAFE - Laboratoire GREYC - UMR6072<br />Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)<br />Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)<br />Laboratory of Advanced Technology and Intelligent Systems (LATIS)<br />National Engineering School of Sousse / Ecole Nationale d'Ingénieurs de Sousse (ENISo)<br />Université de Sousse-Université de Sousse<br />Ecole Nationale d'Ingénieurs de Tunis (ENIT)<br />Université de Tunis El Manar (UTM) ) Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => <i>ISSN: 0167-4048 ; Computers & Security ; https://hal.science/hal-02050175 ; Computers & Security, 2019, 83, pp.151-166. ⟨10.1016/j.cose.2019.02.002⟩</i>. ) Array ( [Name] => Publisher [Label] => Publisher Information [Group] => PubInfo [Data] => HAL CCSD<br />Elsevier ) Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2019 ) Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Normandie Université: HAL ) Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Biometric+authentication%22">Biometric authentication</searchLink><br /><searchLink fieldCode="DE" term="%22Online+classification%22">Online classification</searchLink><br /><searchLink fieldCode="DE" term="%22Template+aging%22">Template aging</searchLink><br /><searchLink fieldCode="DE" term="%22Adaptive+strategy%22">Adaptive strategy</searchLink><br /><searchLink fieldCode="DE" term="%22Keystroke+dynamics%22">Keystroke dynamics</searchLink><br /><searchLink fieldCode="DE" term="%22Template+update%22">Template update</searchLink><br /><searchLink fieldCode="DE" term="%22Adapted+thresholds%22">Adapted thresholds</searchLink><br /><searchLink fieldCode="DE" term="%22KNN-GA%22">KNN-GA</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink> ) Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => International audience ; Cyber-attacks have spread all over the world to steal information such as trade secrets, intellectual property and banking data. Facing the danger of the insecurity of saved data (personal, professional, official, etc.), keystroke dynamics was proposed as an interesting, non-intrusive, inexpensive, permanent and weakly constrained solution for users. Based on the typing rhythm of users, it improves logical access security. Nevertheless, it was demonstrated that such an authentication mechanism would need a larger number of samples to enroll the typing characteristics of users. Moreover, these registered characteristics generally undergo aging effects after a time span. Different solutions have been suggested to remedy these variability problems, including template adaptation. In this paper, we propose a double serial adaptation strategy that considers a single-capture-based enrollment process. When using the authentication system, the template of users and the decision/adaptation thresholds are updated. Experimental results on three public keystroke dynamics datasets show the benefits of the proposed method. ) Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => article in journal/newspaper ) Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English ) Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => hal-02050175; https://hal.science/hal-02050175; https://hal.science/hal-02050175/document; https://hal.science/hal-02050175/file/S0167404818306059.pdf; PII: S0167-4048(18)30605-9 ) Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.1016/j.cose.2019.02.002 ) Array ( [Name] => URL [Label] => Availability [Group] => URL [Data] => https://hal.science/hal-02050175<br />https://hal.science/hal-02050175/document<br />https://hal.science/hal-02050175/file/S0167404818306059.pdf<br />https://doi.org/10.1016/j.cose.2019.02.002 ) Array ( [Name] => Copyright [Label] => Rights [Group] => Cpyrght [Data] => http://creativecommons.org/licenses/by-nc/ ; info:eu-repo/semantics/OpenAccess ) Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsbas.BCE83D62 ) |
RecordInfo |
Array
(
[BibEntity] => Array
(
[Identifiers] => Array
(
[0] => Array
(
[Type] => doi
[Value] => 10.1016/j.cose.2019.02.002
)
)
[Languages] => Array
(
[0] => Array
(
[Text] => English
)
)
[Subjects] => Array
(
[0] => Array
(
[SubjectFull] => Biometric authentication
[Type] => general
)
[1] => Array
(
[SubjectFull] => Online classification
[Type] => general
)
[2] => Array
(
[SubjectFull] => Template aging
[Type] => general
)
[3] => Array
(
[SubjectFull] => Adaptive strategy
[Type] => general
)
[4] => Array
(
[SubjectFull] => Keystroke dynamics
[Type] => general
)
[5] => Array
(
[SubjectFull] => Template update
[Type] => general
)
[6] => Array
(
[SubjectFull] => Adapted thresholds
[Type] => general
)
[7] => Array
(
[SubjectFull] => KNN-GA
[Type] => general
)
[8] => Array
(
[SubjectFull] => [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[Type] => general
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
[Type] => main
)
)
)
[BibRelationships] => Array
(
[HasContributorRelationships] => Array
(
[0] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Mhenni, Abir
)
)
)
[1] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Cherrier, Estelle
)
)
)
[2] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Rosenberger, Christophe
)
)
)
[3] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Essoukri Ben Amara, Najoua
)
)
)
[4] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Equipe SAFE - Laboratoire GREYC - UMR6072
)
)
)
[5] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)
)
)
)
[6] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Université de Caen Normandie (UNICAEN)
)
)
)
[7] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)
)
)
)
[8] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)
)
)
)
[9] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
)
)
)
[10] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Laboratory of Advanced Technology and Intelligent Systems (LATIS)
)
)
)
[11] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => National Engineering School of Sousse / Ecole Nationale d'Ingénieurs de Sousse (ENISo)
)
)
)
[12] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Université de Sousse-Université de Sousse
)
)
)
[13] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Ecole Nationale d'Ingénieurs de Tunis (ENIT)
)
)
)
[14] => Array
(
[PersonEntity] => Array
(
[Name] => Array
(
[NameFull] => Université de Tunis El Manar (UTM)
)
)
)
)
[IsPartOfRelationships] => Array
(
[0] => Array
(
[BibEntity] => Array
(
[Dates] => Array
(
[0] => Array
(
[D] => 01
[M] => 01
[Type] => published
[Y] => 2019
)
)
[Identifiers] => Array
(
[0] => Array
(
[Type] => issn-locals
[Value] => edsbas
)
[1] => Array
(
[Type] => issn-locals
[Value] => edsbas.oa
)
)
[Titles] => Array
(
[0] => Array
(
[TitleFull] => ISSN: 0167-4048 ; Computers & Security ; https://hal.science/hal-02050175 ; Computers & Security, 2019, 83, pp.151-166. ⟨10.1016/j.cose.2019.02.002⟩
[Type] => main
)
)
)
)
)
)
)
|
IllustrationInfo |