Keystroke Application Technique for User Authentication in E-Learning System

이러닝 시스템에서 사용자 인증을 위한 키스트로크의 응용 기술

  • Published : 2008.09.25

Abstract

It is important for users to be confirming in e-Leaning system, because legitimate learner should be joined to the system for teaming and testing Thus, most system for authentication was verified using id and password with learner's id and password. In this case, It can be easy for hackers to steal learner's id and password. In addition, soma learner gets another to sit for the examination for one with another person id and password. For the solution like this problem it needs a biometrics authentication for complement. This method is required so much extra cost as well as are an unwanted concern. Therefore, we proposed keystroke technique to decide which learners are righteous or unlawful in this paper. In addition, we applied statistics and neural network for the performance of keystroke system. As a result, the performance of FAR and FRR in keystroke authentication was increased by proposed method.

이러닝 시스템의 가장 중요한 부분 중 하나가 인증이다. 왜냐하면 적법한 학습자가 학습 시스템에 접속해서 학습하고, 평가 받는 것은 매우 중요하기 때문이다. 하지만, 대부분의 시스템이 학습자의 아이디와 패스워드를 사용한 인증을 사용하고 있다. 이 경우에 해커가 어렵지 않게 아이디와 패스워드를 해킹할 수 있다. 또한, 학습자가 자신의 정보를 다른 동료에게 주어 대신 평가를 받는 수 있다. 이와 같은 문제를 해결하기 위해서는 생체 인증 방법이 보완으로 필요하다. 이와 같은 방법은 상대적으로 많은 비용이 들고 또한 거부감이 있다. 따라서, 본 논문에서는 키스트로크 방법을 이용하여 학습자가 적법한 학습자인가를 판단하는 방법을 제안하였다. 또한, 키스트로크 시스템의 성능을 위해서 통계와 신경망을 적용하였다. 그 결과, 키스트로크의 인증에서 FRR과 FAR의 성능이 개선되었다.

Keywords

References

  1. Monrose, F.; Rubin, A.d., Keystroke dynamics as a biometric for authentication. Future Generation Computer System. Ed. Elsevior, Vol. 16, pp. 351-359, 2000
  2. Bergadano, F., Guneti, D., Picardi, G., User Authentication through Keystroke Dynamics. ACM Transactions on Information and System Security, Vol. 5, No. 4, pp. 367-39, 2002 https://doi.org/10.1145/581271.581272
  3. Beleha, S., Slivinsky, C., Hussein, B., Computer-access Security Systems using Keystroke Dynamics. IEEE Transactions on Pattern Analysis and Machine Intelligence. PAMI-12, 12, pp.1217-1222, 1990 https://doi.org/10.1109/34.62613
  4. Brown., M., Rogers, S.J., Identification Via Keystroke characteristics of Typed Names Using Neural Networks. International Journal on Man-Machine Studies, Vol. 39, pp. 999-1014, 1993 https://doi.org/10.1006/imms.1993.1092
  5. Guneti D., & Picardi, C. , Keystroke Analysis of Free Text. ACM Transactions on Information and System Security, Vol. 8, No. 3, pp. 312-347, 2005 https://doi.org/10.1145/1085126.1085129
  6. Leggest, J, Williams, G., Dynamic Identity Verification Via Keystroke Characteristics. International Journal on Man-Machine Studies. Vol. 35, 859-870, 1991 https://doi.org/10.1016/S0020-7373(05)80165-8
  7. R. Joyce, G. Gupta., Identity Authentication Based on Keystroke Latencies. Communications of the ACM. Vol 33. Issue: 2. pp 168-175, 1990 https://doi.org/10.1145/75577.75582
  8. Cho S, Han C, Han D, Kim H. Web-based keystroke dynamics identity verification using neural network. J Organ Comput Electron Commerce, 10(4):295-307, 2000 https://doi.org/10.1207/S15327744JOCE1004_07
  9. Wong, F., Supian, A., & Ismail, A. Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm. IEEE Conference on Signals, Systems and Computers, 2, 911-915, 2001
  10. Lin, D.-T. Computer-access authentication with neural network based keystroke identity verification. International Conference on Neural Networks, 1, 174-178, 1997
  11. Cardot, H., Hocquet, S., & Ramel, J.-Y. Fusion of methods for keystroke dynamic authentication. Fourth IEEE Workshop on Automatic Identification Advanced Technologies, Oct. 2005 Page(s): 224 - 229, 2005
  12. Zakaria Nouir, Berna Sayrac and Benoit Fourestie, Walid Tabbara and Francoise Brouaye, Comparison of Neural Network Learning Algorithms for Prediction Enhancement of a Planning Tool, 13th European Wireless Conference, 2007