Academic Journal

Double serial adaptation mechanism for keystroke dynamics authentication based on a single password

التفاصيل البيبلوغرافية
العنوان: Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
المؤلفون: Mhenni, Abir, Cherrier, Estelle, Rosenberger, Christophe, Essoukri Ben Amara, Najoua
المساهمون: Equipe SAFE - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS), Laboratory of Advanced Technology and Intelligent Systems (LATIS), National Engineering School of Sousse / Ecole Nationale d'Ingénieurs de Sousse (ENISo), Université de Sousse-Université de Sousse, Ecole Nationale d'Ingénieurs de Tunis (ENIT), Université de Tunis El Manar (UTM)
المصدر: ISSN: 0167-4048 ; Computers & Security ; https://hal.science/hal-02050175 ; Computers & Security, 2019, 83, pp.151-166. ⟨10.1016/j.cose.2019.02.002⟩.
بيانات النشر: HAL CCSD
Elsevier
سنة النشر: 2019
المجموعة: Normandie Université: HAL
مصطلحات موضوعية: Biometric authentication, Online classification, Template aging, Adaptive strategy, Keystroke dynamics, Template update, Adapted thresholds, KNN-GA, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
الوصف: International audience ; Cyber-attacks have spread all over the world to steal information such as trade secrets, intellectual property and banking data. Facing the danger of the insecurity of saved data (personal, professional, official, etc.), keystroke dynamics was proposed as an interesting, non-intrusive, inexpensive, permanent and weakly constrained solution for users. Based on the typing rhythm of users, it improves logical access security. Nevertheless, it was demonstrated that such an authentication mechanism would need a larger number of samples to enroll the typing characteristics of users. Moreover, these registered characteristics generally undergo aging effects after a time span. Different solutions have been suggested to remedy these variability problems, including template adaptation. In this paper, we propose a double serial adaptation strategy that considers a single-capture-based enrollment process. When using the authentication system, the template of users and the decision/adaptation thresholds are updated. Experimental results on three public keystroke dynamics datasets show the benefits of the proposed method.
نوع الوثيقة: article in journal/newspaper
اللغة: English
Relation: hal-02050175; https://hal.science/hal-02050175; https://hal.science/hal-02050175/document; https://hal.science/hal-02050175/file/S0167404818306059.pdf; PII: S0167-4048(18)30605-9
DOI: 10.1016/j.cose.2019.02.002
الاتاحة: https://hal.science/hal-02050175
https://hal.science/hal-02050175/document
https://hal.science/hal-02050175/file/S0167404818306059.pdf
https://doi.org/10.1016/j.cose.2019.02.002
Rights: http://creativecommons.org/licenses/by-nc/ ; info:eu-repo/semantics/OpenAccess
رقم الانضمام: edsbas.BCE83D62
قاعدة البيانات: BASE
ResultId 1
Header edsbas
BASE
edsbas.BCE83D62
893
3
Academic Journal
academicJournal
892.664306640625
PLink https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&scope=site&db=edsbas&AN=edsbas.BCE83D62&custid=s6537998&authtype=sso
FullText Array ( [Availability] => 0 )
Array ( [0] => Array ( [Url] => https://hal.science/hal-02050175# [Name] => EDS - BASE [Category] => fullText [Text] => View record in BASE [MouseOverText] => View record in BASE ) )
Items Array ( [Name] => Title [Label] => Title [Group] => Ti [Data] => Double serial adaptation mechanism for keystroke dynamics authentication based on a single password )
Array ( [Name] => Author [Label] => Authors [Group] => Au [Data] => <searchLink fieldCode="AR" term="%22Mhenni%2C+Abir%22">Mhenni, Abir</searchLink><br /><searchLink fieldCode="AR" term="%22Cherrier%2C+Estelle%22">Cherrier, Estelle</searchLink><br /><searchLink fieldCode="AR" term="%22Rosenberger%2C+Christophe%22">Rosenberger, Christophe</searchLink><br /><searchLink fieldCode="AR" term="%22Essoukri+Ben+Amara%2C+Najoua%22">Essoukri Ben Amara, Najoua</searchLink> )
Array ( [Name] => Author [Label] => Contributors [Group] => Au [Data] => Equipe SAFE - Laboratoire GREYC - UMR6072<br />Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC)<br />Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN)<br />Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)<br />Laboratory of Advanced Technology and Intelligent Systems (LATIS)<br />National Engineering School of Sousse / Ecole Nationale d'Ingénieurs de Sousse (ENISo)<br />Université de Sousse-Université de Sousse<br />Ecole Nationale d'Ingénieurs de Tunis (ENIT)<br />Université de Tunis El Manar (UTM) )
Array ( [Name] => TitleSource [Label] => Source [Group] => Src [Data] => <i>ISSN: 0167-4048 ; Computers & Security ; https://hal.science/hal-02050175 ; Computers & Security, 2019, 83, pp.151-166. ⟨10.1016/j.cose.2019.02.002⟩</i>. )
Array ( [Name] => Publisher [Label] => Publisher Information [Group] => PubInfo [Data] => HAL CCSD<br />Elsevier )
Array ( [Name] => DatePubCY [Label] => Publication Year [Group] => Date [Data] => 2019 )
Array ( [Name] => Subset [Label] => Collection [Group] => HoldingsInfo [Data] => Normandie Université: HAL )
Array ( [Name] => Subject [Label] => Subject Terms [Group] => Su [Data] => <searchLink fieldCode="DE" term="%22Biometric+authentication%22">Biometric authentication</searchLink><br /><searchLink fieldCode="DE" term="%22Online+classification%22">Online classification</searchLink><br /><searchLink fieldCode="DE" term="%22Template+aging%22">Template aging</searchLink><br /><searchLink fieldCode="DE" term="%22Adaptive+strategy%22">Adaptive strategy</searchLink><br /><searchLink fieldCode="DE" term="%22Keystroke+dynamics%22">Keystroke dynamics</searchLink><br /><searchLink fieldCode="DE" term="%22Template+update%22">Template update</searchLink><br /><searchLink fieldCode="DE" term="%22Adapted+thresholds%22">Adapted thresholds</searchLink><br /><searchLink fieldCode="DE" term="%22KNN-GA%22">KNN-GA</searchLink><br /><searchLink fieldCode="DE" term="%22[INFO%2EINFO-CR]Computer+Science+[cs]%2FCryptography+and+Security+[cs%2ECR]%22">[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]</searchLink> )
Array ( [Name] => Abstract [Label] => Description [Group] => Ab [Data] => International audience ; Cyber-attacks have spread all over the world to steal information such as trade secrets, intellectual property and banking data. Facing the danger of the insecurity of saved data (personal, professional, official, etc.), keystroke dynamics was proposed as an interesting, non-intrusive, inexpensive, permanent and weakly constrained solution for users. Based on the typing rhythm of users, it improves logical access security. Nevertheless, it was demonstrated that such an authentication mechanism would need a larger number of samples to enroll the typing characteristics of users. Moreover, these registered characteristics generally undergo aging effects after a time span. Different solutions have been suggested to remedy these variability problems, including template adaptation. In this paper, we propose a double serial adaptation strategy that considers a single-capture-based enrollment process. When using the authentication system, the template of users and the decision/adaptation thresholds are updated. Experimental results on three public keystroke dynamics datasets show the benefits of the proposed method. )
Array ( [Name] => TypeDocument [Label] => Document Type [Group] => TypDoc [Data] => article in journal/newspaper )
Array ( [Name] => Language [Label] => Language [Group] => Lang [Data] => English )
Array ( [Name] => NoteTitleSource [Label] => Relation [Group] => SrcInfo [Data] => hal-02050175; https://hal.science/hal-02050175; https://hal.science/hal-02050175/document; https://hal.science/hal-02050175/file/S0167404818306059.pdf; PII: S0167-4048(18)30605-9 )
Array ( [Name] => DOI [Label] => DOI [Group] => ID [Data] => 10.1016/j.cose.2019.02.002 )
Array ( [Name] => URL [Label] => Availability [Group] => URL [Data] => https://hal.science/hal-02050175<br />https://hal.science/hal-02050175/document<br />https://hal.science/hal-02050175/file/S0167404818306059.pdf<br />https://doi.org/10.1016/j.cose.2019.02.002 )
Array ( [Name] => Copyright [Label] => Rights [Group] => Cpyrght [Data] => http://creativecommons.org/licenses/by-nc/ ; info:eu-repo/semantics/OpenAccess )
Array ( [Name] => AN [Label] => Accession Number [Group] => ID [Data] => edsbas.BCE83D62 )
RecordInfo Array ( [BibEntity] => Array ( [Identifiers] => Array ( [0] => Array ( [Type] => doi [Value] => 10.1016/j.cose.2019.02.002 ) ) [Languages] => Array ( [0] => Array ( [Text] => English ) ) [Subjects] => Array ( [0] => Array ( [SubjectFull] => Biometric authentication [Type] => general ) [1] => Array ( [SubjectFull] => Online classification [Type] => general ) [2] => Array ( [SubjectFull] => Template aging [Type] => general ) [3] => Array ( [SubjectFull] => Adaptive strategy [Type] => general ) [4] => Array ( [SubjectFull] => Keystroke dynamics [Type] => general ) [5] => Array ( [SubjectFull] => Template update [Type] => general ) [6] => Array ( [SubjectFull] => Adapted thresholds [Type] => general ) [7] => Array ( [SubjectFull] => KNN-GA [Type] => general ) [8] => Array ( [SubjectFull] => [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [Type] => general ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => Double serial adaptation mechanism for keystroke dynamics authentication based on a single password [Type] => main ) ) ) [BibRelationships] => Array ( [HasContributorRelationships] => Array ( [0] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Mhenni, Abir ) ) ) [1] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Cherrier, Estelle ) ) ) [2] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Rosenberger, Christophe ) ) ) [3] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Essoukri Ben Amara, Najoua ) ) ) [4] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Equipe SAFE - Laboratoire GREYC - UMR6072 ) ) ) [5] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC) ) ) ) [6] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Université de Caen Normandie (UNICAEN) ) ) ) [7] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN) ) ) ) [8] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN) ) ) ) [9] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS) ) ) ) [10] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Laboratory of Advanced Technology and Intelligent Systems (LATIS) ) ) ) [11] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => National Engineering School of Sousse / Ecole Nationale d'Ingénieurs de Sousse (ENISo) ) ) ) [12] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Université de Sousse-Université de Sousse ) ) ) [13] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Ecole Nationale d'Ingénieurs de Tunis (ENIT) ) ) ) [14] => Array ( [PersonEntity] => Array ( [Name] => Array ( [NameFull] => Université de Tunis El Manar (UTM) ) ) ) ) [IsPartOfRelationships] => Array ( [0] => Array ( [BibEntity] => Array ( [Dates] => Array ( [0] => Array ( [D] => 01 [M] => 01 [Type] => published [Y] => 2019 ) ) [Identifiers] => Array ( [0] => Array ( [Type] => issn-locals [Value] => edsbas ) [1] => Array ( [Type] => issn-locals [Value] => edsbas.oa ) ) [Titles] => Array ( [0] => Array ( [TitleFull] => ISSN: 0167-4048 ; Computers & Security ; https://hal.science/hal-02050175 ; Computers & Security, 2019, 83, pp.151-166. ⟨10.1016/j.cose.2019.02.002⟩ [Type] => main ) ) ) ) ) ) )
IllustrationInfo