On continuous user authentication via hidden free-text based monitoring

Elena Kochegurova, Elena Luneva, Ekaterina Gorokhova

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

This paper investigates the stages and specific features of continuous user authentication by hidden monitoring of keystroke dynamics when creating a free text. The stages include extraction of informative characteristics of keyboard rhythm, creation and update of user profiles and identification of efficiency criteria. A software application was developed for the project. The authors further analyzed existing algorithms for user identification based in metric distances. Previously proved features of keystroke dynamics were scaled with regard to frequency of use of Russian and English letters in free texts.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’18) - Volume 2
EditorsValery Tarassov, Sergey Kovalev, Andrey Sukhanov, Ajith Abraham, Vaclav Snasel
PublisherSpringer Verlag
Pages66-75
Number of pages10
ISBN (Print)9783030018207
DOIs
Publication statusPublished - 1 Jan 2019
Event3rd International Scientific Conference on Intelligent Information Technologies for Industry, IITI 2018 - Sochi, Russian Federation
Duration: 17 Sep 201821 Sep 2018

Publication series

NameAdvances in Intelligent Systems and Computing
Volume875
ISSN (Print)2194-5357

Conference

Conference3rd International Scientific Conference on Intelligent Information Technologies for Industry, IITI 2018
CountryRussian Federation
CitySochi
Period17.9.1821.9.18

Keywords

  • Behavioral biometrics
  • Classification
  • Continuous authentication
  • Feature selection
  • Keystroke dynamics

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science(all)

Fingerprint Dive into the research topics of 'On continuous user authentication via hidden free-text based monitoring'. Together they form a unique fingerprint.

  • Cite this

    Kochegurova, E., Luneva, E., & Gorokhova, E. (2019). On continuous user authentication via hidden free-text based monitoring. In V. Tarassov, S. Kovalev, A. Sukhanov, A. Abraham, & V. Snasel (Eds.), Proceedings of the 3rd International Scientific Conference “Intelligent Information Technologies for Industry” (IITI’18) - Volume 2 (pp. 66-75). (Advances in Intelligent Systems and Computing; Vol. 875). Springer Verlag. https://doi.org/10.1007/978-3-030-01821-4_8