浏览全部资源
扫码关注微信
1. 通信信息控制和安全技术重点实验室,浙江 嘉兴 314033
2. 中国电子科技集团公司第三十六研究所,浙江 嘉兴 314033
[ "沈伟国(1987-),男,浙江湖州人,中国电子科技集团公司第三十六研究所工程师,主要研究方向为网络安全。" ]
[ "王巍(1980-),男,河北张家口人,博士,中国电子科技集团公司第三十六研究所高级工程师,主要研究方向为网络安全。" ]
网络出版日期:2017-11,
纸质出版日期:2017-11-25
移动端阅览
沈伟国, 王巍. 基于顽健线性判别分析的击键特征识别方法[J]. 通信学报, 2017,38(Z2):26-29.
Wei-guo SHEN, Wei WANG. Keystroke features recognition based on stable linear discriminant analysis[J]. Journal on communications, 2017, 38(Z2): 26-29.
沈伟国, 王巍. 基于顽健线性判别分析的击键特征识别方法[J]. 通信学报, 2017,38(Z2):26-29. DOI: 10.11959/j.issn.1000-436x.2017272.
Wei-guo SHEN, Wei WANG. Keystroke features recognition based on stable linear discriminant analysis[J]. Journal on communications, 2017, 38(Z2): 26-29. DOI: 10.11959/j.issn.1000-436x.2017272.
研究了用户认证过程中的键盘击键序列特征提取和分类问题,提出一种基于顽健线性判别分析的击键特征识别方法。首先,最大化击键序列集不同类间的离散度,同时最小化序列集同类之间的离散度,保持击键序列样本的最佳判别特性。其次,最小化近邻击键序列样本间的相似性离散度,保持序列样本的区域相似性。最后,基于上述原则,对击键序列特征样本进行特征提取,并采用最近邻分类准则进行判决输出。通过与其他方法的实验对比,验证了该方法的有效性。
A novel keystroke features recognition method based on stable linear discriminant Analysis (SLDA) was put forward.First of all
it maximum the dispersion between different sequences
while minimizing the dispersion between the same sequence set
maintain the best discriminant characteristics of the keystroke sequences.Secondly
the local similarity graph between keystroke sequences is constructed
minimizing the dispersion of the local similarity sequences
to keep the local similarity of keystroke sequences.Finally
based on the principles above
the feature of keystroke sequences are extracted
and the nearest neighbor classification criterion is used to judge the outputs.The effectiveness of the proposed method is certified by experiment results.
GAINES R , LISOWSKI W , PRESS S . Authentication by keystroke timing:some preliminary results [R ] . Rand Corporation:Rand Report R-2560-NSF , 1980 .
JOYCE R , GUPTA G . Identity authentication based on keystroke latencies [J ] . Commun ACM , 1990 , 33 ( 2 ): 168 - 176 .
ROBINSON J , LIANG V . Computer user verification login string keystroke dynamics [J ] . IEEE Trans Syst Man Cybern , 1998 , 28 ( 2 ): 236 - 241 .
LEGGETT J , WILLIAMS G , USNICK J . Dynamic identity verification via keystroke characteristics [J ] . International Journal of Man-machine Studies , 1991 ,( 35 ): 859 - 870 .
NAPIER R , LABERTY W , MAHAR W . Keyboard user verification:toward an accurate,efficient,andecologically valid algorithm [J ] . International Journal of Human Computer Studies , 1995 ( 43 ): 213 - 222 .
DUNN A . biometric authentication-real identities for a virtual world,MIDAS [R ] . Project Development Final Report , 2002 .
SALEH B , CHARLES S , BASSAM E . Computer-access security systems using keystroke dynamics [J ] . IEEE Transaction on Pattern Analysis and Machine Intelligence , 1990 , 12 ( 12 ): 1217 - 1222 .
高艳 , 管晓宏 , 冯力 . 基于实时击键序列的主机入侵检测 [J ] . 计算机学报 , 2004 , 27 ( 3 ): 396 - 401 .
GAO Y , GUAN X H , FENG L . The host-based intrusion detection based on real time keystroke sequences [J ] . Chinese Journal of Computers , 2004 , 27 ( 3 ): 396 - 401 .
MONROSE F , RUBIN A . Authentication via keystroke dynamics [C ] // Fourth ACM Conference on Computer and Communications Security , 1997 3.
SHI Y , CAO L M . User identity verification based on recognition of typing style [J ] . Computer Engineering , 2005 , 31 ( 6 ).
LIANG J , WANG X , CHEN W W . Recognition of user’s keystroke features based on difference subspace [J ] . Computer Engineering , 2007 , 33 ( 11 )
WANG Y J , ZHAO P H , WANG M M . Method of user identification based on keystroke behavior and its application [J ] . Computer Science , 2015 , 42 ( 11 ).
王振辉 , 王振铎 , 支侃买 . 基于鼠标和键盘行为特征组合的用户身份认证 [J ] . 计算机应用与软件 , 2016 , 33 ( 7 ): 308 - 312 .
WANG Z H , WANG Z D , ZHI K M . User identity authentication based on mouse and keyboard behavioural biometrics combination [J ] . Computer Applications and Software , 2016 , 33 ( 7 ): 308 - 312 .
王晅 , 陈伟伟 , 马建峰 . 基于遗传算法和灰色关联分析的击键特征识别算法 [J ] . 计算机应用 , 2007 , 27 ( 5 ): 1054 - 1057 .
WANG X , CHEN W W , MA J F . User authentication algorithm with keystroke features based on genetic algorithms and grey relational analysis [J ] . Journal of Computer Applications , 2007 , 27 ( 5 ): 1054 - 1057 .
蒋李芬 , 刘家芬 . 基于键盘行为数据的用户身份识别 [J ] . 计算机应用 , 2015 , 35 ( SI ): 110 - 112 .
JIANG L F , LIU J F . User authentication based on keystroke dynamics [J ] . Journal of Computer Applications , 2015 , 35 ( SI ): 110 - 112 .
0
浏览量
466
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构