Password secured sites - stepping forward with keystroke dynamics
Computer authentication is a critical component of most computer systems -especially those used in e-commerce activities over the Internet. Global access to information makes security, namely the authentication process, a critical design issue in these systems. In what concerns to authentication, wh...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 298 |
---|---|
container_issue | |
container_start_page | 6 pp. |
container_title | |
container_volume | |
creator | de Magalhaes, S.T. Revett, K. Santos, H.M.D. |
description | Computer authentication is a critical component of most computer systems -especially those used in e-commerce activities over the Internet. Global access to information makes security, namely the authentication process, a critical design issue in these systems. In what concerns to authentication, what is required is a reliable, hardware independent and efficient security system. In this paper, we propose an extension to a keystroke dynamics based security system. We provide evidence that completely software based systems can be as effective as expensive and cumbersome hardware based systems. Our system is a behavioral based system that captures the normal typing patterns of a user and uses that information, in addition to standard login/password security to provide a system that is user friendly and very effective at detecting imposters. The results provide a means of dealing with enhanced security that is growing in demand in Web based applications based on e-commerce. |
doi_str_mv | 10.1109/NWESP.2005.62 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>rcaap_6IE</sourceid><recordid>TN_cdi_ieee_primary_1592443</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1592443</ieee_id><sourcerecordid>1822_3625</sourcerecordid><originalsourceid>FETCH-LOGICAL-i199t-dd739e914bac6ce26c6851a0b01281d774eb7a485dd5d526efdfd5c98e446bb33</originalsourceid><addsrcrecordid>eNotzEtLw0AYheEBEZSapSsXzh9InPtlWUq9QNGCisswmfmiY20TZqIh_76Bejbv5uEgdE1JRSmxd88f69dtxQiRlWJnqLDaEK2sZEIyc4GKnL_JPCGkMOoSLbcu57FLAWfwvwnmxgEyLnEeoO_j4RO3XRrdDMY4fOEdTHlI3Q5wmA5uH32-Quet-8lQ_HeB3u_Xb6vHcvPy8LRabspIrR3KEDS3YKlonFcemPLKSOpIQygzNGgtoNFOGBmCDJIpaEMbpLcGhFBNw_kC3Z5-k3eurxP8xTy4XFPDWM0Vk7O4OYkIAHWf4t6lqabSMiE4PwIa1VNI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Password secured sites - stepping forward with keystroke dynamics</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>de Magalhaes, S.T. ; Revett, K. ; Santos, H.M.D.</creator><creatorcontrib>de Magalhaes, S.T. ; Revett, K. ; Santos, H.M.D.</creatorcontrib><description>Computer authentication is a critical component of most computer systems -especially those used in e-commerce activities over the Internet. Global access to information makes security, namely the authentication process, a critical design issue in these systems. In what concerns to authentication, what is required is a reliable, hardware independent and efficient security system. In this paper, we propose an extension to a keystroke dynamics based security system. We provide evidence that completely software based systems can be as effective as expensive and cumbersome hardware based systems. Our system is a behavioral based system that captures the normal typing patterns of a user and uses that information, in addition to standard login/password security to provide a system that is user friendly and very effective at detecting imposters. The results provide a means of dealing with enhanced security that is growing in demand in Web based applications based on e-commerce.</description><identifier>ISBN: 9780769524528</identifier><identifier>ISBN: 0769524524</identifier><identifier>DOI: 10.1109/NWESP.2005.62</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; Biometrics ; Collaboration ; Data security ; Electronic commerce ; Hardware ; Heuristic algorithms ; Information security ; Information systems ; Keystroke dynamics ; Science & Technology ; Security ; Web services</subject><ispartof>International Conference on Next Generation Web Services Practices (NWeSP'05), 2005, p.6 pp.-298</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1592443$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2051,4035,4036,27904,54898</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1592443$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>de Magalhaes, S.T.</creatorcontrib><creatorcontrib>Revett, K.</creatorcontrib><creatorcontrib>Santos, H.M.D.</creatorcontrib><title>Password secured sites - stepping forward with keystroke dynamics</title><title>International Conference on Next Generation Web Services Practices (NWeSP'05)</title><addtitle>NWESP</addtitle><description>Computer authentication is a critical component of most computer systems -especially those used in e-commerce activities over the Internet. Global access to information makes security, namely the authentication process, a critical design issue in these systems. In what concerns to authentication, what is required is a reliable, hardware independent and efficient security system. In this paper, we propose an extension to a keystroke dynamics based security system. We provide evidence that completely software based systems can be as effective as expensive and cumbersome hardware based systems. Our system is a behavioral based system that captures the normal typing patterns of a user and uses that information, in addition to standard login/password security to provide a system that is user friendly and very effective at detecting imposters. The results provide a means of dealing with enhanced security that is growing in demand in Web based applications based on e-commerce.</description><subject>Authentication</subject><subject>Biometrics</subject><subject>Collaboration</subject><subject>Data security</subject><subject>Electronic commerce</subject><subject>Hardware</subject><subject>Heuristic algorithms</subject><subject>Information security</subject><subject>Information systems</subject><subject>Keystroke dynamics</subject><subject>Science & Technology</subject><subject>Security</subject><subject>Web services</subject><isbn>9780769524528</isbn><isbn>0769524524</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotzEtLw0AYheEBEZSapSsXzh9InPtlWUq9QNGCisswmfmiY20TZqIh_76Bejbv5uEgdE1JRSmxd88f69dtxQiRlWJnqLDaEK2sZEIyc4GKnL_JPCGkMOoSLbcu57FLAWfwvwnmxgEyLnEeoO_j4RO3XRrdDMY4fOEdTHlI3Q5wmA5uH32-Quet-8lQ_HeB3u_Xb6vHcvPy8LRabspIrR3KEDS3YKlonFcemPLKSOpIQygzNGgtoNFOGBmCDJIpaEMbpLcGhFBNw_kC3Z5-k3eurxP8xTy4XFPDWM0Vk7O4OYkIAHWf4t6lqabSMiE4PwIa1VNI</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>de Magalhaes, S.T.</creator><creator>Revett, K.</creator><creator>Santos, H.M.D.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope><scope>RCLKO</scope></search><sort><creationdate>2005</creationdate><title>Password secured sites - stepping forward with keystroke dynamics</title><author>de Magalhaes, S.T. ; Revett, K. ; Santos, H.M.D.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i199t-dd739e914bac6ce26c6851a0b01281d774eb7a485dd5d526efdfd5c98e446bb33</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Authentication</topic><topic>Biometrics</topic><topic>Collaboration</topic><topic>Data security</topic><topic>Electronic commerce</topic><topic>Hardware</topic><topic>Heuristic algorithms</topic><topic>Information security</topic><topic>Information systems</topic><topic>Keystroke dynamics</topic><topic>Science & Technology</topic><topic>Security</topic><topic>Web services</topic><toplevel>online_resources</toplevel><creatorcontrib>de Magalhaes, S.T.</creatorcontrib><creatorcontrib>Revett, K.</creatorcontrib><creatorcontrib>Santos, H.M.D.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection><collection>RCAAP open access repository</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>de Magalhaes, S.T.</au><au>Revett, K.</au><au>Santos, H.M.D.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Password secured sites - stepping forward with keystroke dynamics</atitle><btitle>International Conference on Next Generation Web Services Practices (NWeSP'05)</btitle><stitle>NWESP</stitle><date>2005</date><risdate>2005</risdate><spage>6 pp.</spage><epage>298</epage><pages>6 pp.-298</pages><isbn>9780769524528</isbn><isbn>0769524524</isbn><abstract>Computer authentication is a critical component of most computer systems -especially those used in e-commerce activities over the Internet. Global access to information makes security, namely the authentication process, a critical design issue in these systems. In what concerns to authentication, what is required is a reliable, hardware independent and efficient security system. In this paper, we propose an extension to a keystroke dynamics based security system. We provide evidence that completely software based systems can be as effective as expensive and cumbersome hardware based systems. Our system is a behavioral based system that captures the normal typing patterns of a user and uses that information, in addition to standard login/password security to provide a system that is user friendly and very effective at detecting imposters. The results provide a means of dealing with enhanced security that is growing in demand in Web based applications based on e-commerce.</abstract><pub>IEEE</pub><doi>10.1109/NWESP.2005.62</doi><tpages>6</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769524528 |
ispartof | International Conference on Next Generation Web Services Practices (NWeSP'05), 2005, p.6 pp.-298 |
issn | |
language | eng |
recordid | cdi_ieee_primary_1592443 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication Biometrics Collaboration Data security Electronic commerce Hardware Heuristic algorithms Information security Information systems Keystroke dynamics Science & Technology Security Web services |
title | Password secured sites - stepping forward with keystroke dynamics |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-25T08%3A39%3A50IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-rcaap_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Password%20secured%20sites%20-%20stepping%20forward%20with%20keystroke%20dynamics&rft.btitle=International%20Conference%20on%20Next%20Generation%20Web%20Services%20Practices%20(NWeSP'05)&rft.au=de%20Magalhaes,%20S.T.&rft.date=2005&rft.spage=6%20pp.&rft.epage=298&rft.pages=6%20pp.-298&rft.isbn=9780769524528&rft.isbn_list=0769524524&rft_id=info:doi/10.1109/NWESP.2005.62&rft_dat=%3Crcaap_6IE%3E1822_3625%3C/rcaap_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1592443&rfr_iscdi=true |