Keywords: information security, information protection, identification, authentication, biometry, keyboard handwriting, bigrams
IDENTIFICATION OF USERS BY KEYBOARD HANDWRITING USING THE ALGORITHM OF FREQUENT BIGRAMS REGISTRATION
UDC 004.93’4
DOI:
In this article the developed algorithm for identification of users by keyboard handwriting with registration of frequent bigrams is considered. By means of this algorithm it is possible to carry out identification of users in a constant, continuous operation in computer system. The offered algorithm eliminates defects of existing user identification methods which are used only during login and by that do not protect system from invasion after authorization of the user. As temporal indices of keyboard handwriting the following characteristics are used: key press time, pauses between clicking of keys. Time response characteristics are gathered according to each bigram separately, it is necessary because keys are located at different distances from each other and it turns out that temporal time delays of clicking of the same key will differ in different bigrams. That will use more often bigrams during operation of the user in system, especially time response characteristics will be exact and respectively the efficiency of user identification will increase. After carrying out identification if data differ from reference, then the subsequent lock of execution of actions by the user is possible. For confirmation of overall performance of an algorithm results of check using a finding method Euclidean distances are provided
1. Biometricheskie tekhnologii [Digital resource] / M.: ID Expert. – Access mode: http://www.idexpert.ru/technology/119/, free access
2. Bochkarev, S.L. Unifikatsiya biometricheskikh tekhnologiy: interfeis BioAPI [Text] / S.L. Bochkarev. – M.: Konfident, 2002. – 174 p
3. Bryokhomitskiy, Y.A. Immunologicheskiy podhod k organizatsii klaviaturnogo monitoringa [Text] / Izvestiya YFU. Tekhnicheskie nauki. Tematicheskiy vypisk «Informatsionnaya bezopasnost». – Taganrog: Izd-vo TTI YFU, 2014. – № 2 (151). pp.33-41.
4. Bryokhomitskiy, Y.A. Sistema skrytogo klaviaturnogo monitoringa [Text] / Y.A. Bryokhomitskiy, M.N. Kazarin / Izvestiya TRTU. – 2006. pp.153-154.
5. Bryokhomitskiy, Y.A. Tsepochniy metod klaviaturnogo monitoringa [Text] / «Izvestiya YFU. Tekhnicheskie nauki». Tematicheskiy vypusk «Informatsionnaya bezopasnost». – Taganrog: Izd-vo TTI YFU, 2009. – № 11. pp.135-145.
6. Vasilyev V.I. Raspoznavanie psikhofiziologicheskikh sostoyaniy polzovateley na osnove skrytogo monitoringa deistviy v kompyoternikh sistemakh [Text] / V.I. Vasilyev, A.E. Sulavko, R.V. Borisov, S.S. Zhumazhanova / «Iskusstvenniy intellekt i prinyatie resheniy», 2017. – № 3. pp. 21-37.
7. Kontsepsiya I modeli menedzhmenta bezopasnosti informatsionnikh I telekommunikatsionnikh tekhnologiy [Digital resourse] / GOST R ISO/MEK 13335-1-2006 Metody I sredstva obespecheniya bezopasnosti. – Acess mode: http://vsegost.com/Catalog/27/271.shtml, free access.
8. Makarevich, O.B. (Ed.) «Aktualnie aspekty informatsionnoy bezopasnosti» [Text] / O.B. Makarevich. – Taganrog: Izd-vo TTI YFU, 2011. – 448 p.
9. Piletskiy, I.I. Metody I tekhnologii programmirovaniya [Text] / I.I. Piletskiy. – Minsk: BGUIR, 2007. – 238 p.
10. Troelsen, E. Yazik programmirovaniya C# 2010 I platforma .NET4. 5-e izdanie [Text] / E. Troelsen. – M.: Vilyams, 2011. – 1392 p.
Keywords: information security, information protection, identification, authentication, biometry, keyboard handwriting, bigrams
For citation: Vasiliev V.I., Kalyamov M.F., Kalyamova L.F. IDENTIFICATION OF USERS BY KEYBOARD HANDWRITING USING THE ALGORITHM OF FREQUENT BIGRAMS REGISTRATION. Modeling, Optimization and Information Technology. 2018;6(1). URL: https://moit.vivt.ru/wp-content/uploads/2018/01/VasilyevKaliamovi_1_1_18.pdf DOI: (In Russ).
Published 31.03.2018