Developing a keystroke dynamics based agent using rough sets
Main Author: | |
---|---|
Publication Date: | 2005 |
Other Authors: | , |
Language: | eng |
Source: | Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
Download full: | http://hdl.handle.net/1822/3357 |
Summary: | Software based biometrics, utilising keystroke dynamics has been proposed as a cost effective means of enhancing computer access security. Keystroke dynamics has been successfully employed as a means of identifying legitimate/illegitimate login attempts based on the typing style of the login entry. In this paper, we collected keystroke dynamics data in the form of digraphs from a series of users entering a specific login ID. We wished to determine if there were any particular patterns in the typing styles that would indicate whether a login attempt was legitimate or not using rough sets. Our analysis produced a sensitivity of 98%, specificity of 94% and an overall accuracy of 97% with respect to detecting intruders. In addition, our results indicate that typing speed and particular digraph combinations were the main determinants with respect to automated detection of system attacks. |
id |
RCAP_de937c9035915c34a0aaa722928da3f3 |
---|---|
oai_identifier_str |
oai:repositorium.sdum.uminho.pt:1822/3357 |
network_acronym_str |
RCAP |
network_name_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository_id_str |
https://opendoar.ac.uk/repository/7160 |
spelling |
Developing a keystroke dynamics based agent using rough setsKeystroke dynamicsRough setsSecurityAuthenticationBiometrySoftware based biometrics, utilising keystroke dynamics has been proposed as a cost effective means of enhancing computer access security. Keystroke dynamics has been successfully employed as a means of identifying legitimate/illegitimate login attempts based on the typing style of the login entry. In this paper, we collected keystroke dynamics data in the form of digraphs from a series of users entering a specific login ID. We wished to determine if there were any particular patterns in the typing styles that would indicate whether a login attempt was legitimate or not using rough sets. Our analysis produced a sensitivity of 98%, specificity of 94% and an overall accuracy of 97% with respect to detecting intruders. In addition, our results indicate that typing speed and particular digraph combinations were the main determinants with respect to automated detection of system attacks.University of Technology of CompiègneUniversidade do MinhoRevett, KennethMagalhães, Paulo Sérgio TenreiroSantos, Henrique Dinis dos2005-09-192005-09-19T00:00:00Zconference paperinfo:eu-repo/semantics/publishedVersionapplication/pdfhttp://hdl.handle.net/1822/3357engINTERNATIONAL WORKSHOP ON ROUGH SETS AND SOFT COMPUTING IN INTELLIGENT AGENT AND WEB TECHNOLOGIES, Compégne: University of Technology of Compiègne, 2005 - “International Workshop On Rough Sets And Soft Computing In Intelligent Agent And Web Technologies : Proceedings”. [S.l. : s.n., ]. 2005. ISBN 2-913923-15-1.2-913923-15-1info:eu-repo/semantics/openAccessreponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP)instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiainstacron:RCAAP2024-05-11T05:28:30Zoai:repositorium.sdum.uminho.pt:1822/3357Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireinfo@rcaap.ptopendoar:https://opendoar.ac.uk/repository/71602025-05-28T15:19:42.961491Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologiafalse |
dc.title.none.fl_str_mv |
Developing a keystroke dynamics based agent using rough sets |
title |
Developing a keystroke dynamics based agent using rough sets |
spellingShingle |
Developing a keystroke dynamics based agent using rough sets Revett, Kenneth Keystroke dynamics Rough sets Security Authentication Biometry |
title_short |
Developing a keystroke dynamics based agent using rough sets |
title_full |
Developing a keystroke dynamics based agent using rough sets |
title_fullStr |
Developing a keystroke dynamics based agent using rough sets |
title_full_unstemmed |
Developing a keystroke dynamics based agent using rough sets |
title_sort |
Developing a keystroke dynamics based agent using rough sets |
author |
Revett, Kenneth |
author_facet |
Revett, Kenneth Magalhães, Paulo Sérgio Tenreiro Santos, Henrique Dinis dos |
author_role |
author |
author2 |
Magalhães, Paulo Sérgio Tenreiro Santos, Henrique Dinis dos |
author2_role |
author author |
dc.contributor.none.fl_str_mv |
Universidade do Minho |
dc.contributor.author.fl_str_mv |
Revett, Kenneth Magalhães, Paulo Sérgio Tenreiro Santos, Henrique Dinis dos |
dc.subject.por.fl_str_mv |
Keystroke dynamics Rough sets Security Authentication Biometry |
topic |
Keystroke dynamics Rough sets Security Authentication Biometry |
description |
Software based biometrics, utilising keystroke dynamics has been proposed as a cost effective means of enhancing computer access security. Keystroke dynamics has been successfully employed as a means of identifying legitimate/illegitimate login attempts based on the typing style of the login entry. In this paper, we collected keystroke dynamics data in the form of digraphs from a series of users entering a specific login ID. We wished to determine if there were any particular patterns in the typing styles that would indicate whether a login attempt was legitimate or not using rough sets. Our analysis produced a sensitivity of 98%, specificity of 94% and an overall accuracy of 97% with respect to detecting intruders. In addition, our results indicate that typing speed and particular digraph combinations were the main determinants with respect to automated detection of system attacks. |
publishDate |
2005 |
dc.date.none.fl_str_mv |
2005-09-19 2005-09-19T00:00:00Z |
dc.type.driver.fl_str_mv |
conference paper |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/1822/3357 |
url |
http://hdl.handle.net/1822/3357 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.relation.none.fl_str_mv |
INTERNATIONAL WORKSHOP ON ROUGH SETS AND SOFT COMPUTING IN INTELLIGENT AGENT AND WEB TECHNOLOGIES, Compégne: University of Technology of Compiègne, 2005 - “International Workshop On Rough Sets And Soft Computing In Intelligent Agent And Web Technologies : Proceedings”. [S.l. : s.n., ]. 2005. ISBN 2-913923-15-1. 2-913923-15-1 |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.publisher.none.fl_str_mv |
University of Technology of Compiègne |
publisher.none.fl_str_mv |
University of Technology of Compiègne |
dc.source.none.fl_str_mv |
reponame:Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) instname:FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia instacron:RCAAP |
instname_str |
FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
collection |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) |
repository.name.fl_str_mv |
Repositórios Científicos de Acesso Aberto de Portugal (RCAAP) - FCCN, serviços digitais da FCT – Fundação para a Ciência e a Tecnologia |
repository.mail.fl_str_mv |
info@rcaap.pt |
_version_ |
1833595246242430976 |