Anomaly detection approach to keystroke dynamics based user authentication
Ivannikova, E., David, G., & Hämäläinen, T. (2017). Anomaly detection approach to keystroke dynamics based user authentication. In ISCC 2017 : Proceedings of the 2017 IEEE Symposium on Computers and Communications (pp. 885-889). IEEE. Proceedings : IEEE Symposium on Computers and Communications. https://doi.org/10.1109/ISCC.2017.8024638
Julkaistu sarjassa
Proceedings : IEEE Symposium on Computers and CommunicationsPäivämäärä
2017Tekijänoikeudet
© 2017 IEEE. This is a final draft of an article whose final and definitive version has been published by IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works. We evaluated the methods using the CMU keystroke dynamics benchmark dataset. Both proposed approaches outperformed the previous state-of-the-art results for the CMU dataset for unsupervised learning.
Julkaisija
IEEEEmojulkaisun ISBN
978-1-5386-1629-1Konferenssi
IEEE Symposium on Computers and CommunicationsKuuluu julkaisuun
ISCC 2017 : Proceedings of the 2017 IEEE Symposium on Computers and CommunicationsISSN Hae Julkaisufoorumista
1530-1346Julkaisu tutkimustietojärjestelmässä
https://converis.jyu.fi/converis/portal/detail/Publication/27298398
Metadata
Näytä kaikki kuvailutiedotKokoelmat
Samankaltainen aineisto
Näytetään aineistoja, joilla on samankaltainen nimeke tai asiasanat.
-
Exploring Azure Active Directory Attack Surface : Enumerating Authentication Methods with Open-Source Intelligence Tools
Syynimaa, Nestori (SCITEPRESS Science And Technology Publications, 2022)Azure Active Directory (Azure AD) is Microsoft’s identity and access management service used globally by 90 per cent of Fortune 500 companies and many other organisations. Recent attacks by nation-state adversaries have ... -
Secure and coherent external user identity management
Kähtävä, Konsta (2023)Pro gradu käsittelee ulkoisten identiteettien hallintaa kohdeyrityksessä. Identiteettien hallinnan tärkeys yritysten tietoturvan hallintamekanismina korostuu päivä päivältä. Identiteetin hallinnan tärkeys korostuu varsinkin ... -
Intrusion detection applications using knowledge discovery and data mining
Juvonen, Antti (University of Jyväskylä, 2014) -
Pedagogical approaches for e-assessment with authentication and authorship verification in Higher Education
Okada, Alexandra; Noguera, Ingrid; Alexieva, Lyubka; Rozeva, Anna; Kocdar, Serpil; Brouns, Francis; Ladonlahti, Tarja; Whitelock, Denise; Guerrero‐Roldán, Ana‐Elena (Wiley-Blackwell Publishing Ltd., 2019)Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects ... -
Family Matters : Abusing Family Refresh Tokens to Gain Unauthorised Access to Microsoft Cloud Services Exploratory Study of Azure Active Directory Family of Client IDs
Cobb, Ryan; Larcher-Gore, Anthony; Syynimaa, Nestori (SCITEPRESS Science And Technology Publications, 2022)Azure Active Directory (Azure AD) is an identity and access management service used by Microsoft 365 and Azure services and thousands of third-party service providers. Azure AD uses OIDC and OAuth protocols for authentication ...
Ellei toisin mainittu, julkisesti saatavilla olevia JYX-metatietoja (poislukien tiivistelmät) saa vapaasti uudelleenkäyttää CC0-lisenssillä.