• Title/Summary/Keyword: 키스트로크

Search Result 17, Processing Time 0.028 seconds

A Fortified Password Automatic Generator (강화된 암호 자동 생성기)

  • Jung, June-Ho;Kim, Jung-Sook
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.387-388
    • /
    • 2012
  • 본 논문에서는 사람들의 키 입력 패턴은 각자 고유한 패턴을 지니고 있다는 점에서 시작한다. 즉, 키스트로크 기반 사용자 인증이라는 방식의 사용자 인증이 존재하고 있다. 다만 키 입력 패턴을 통한 사용자를 인증할 때의 정확도가 문제가 될 것인데, 본 논문에서는 다수의 사람들에게 다수의 단어를 입력하게 하였을 시 각 단어마다 가장 긴 지연을 지니고 있는 구간이 존재한다는 것을 가정으로 하였다. 정확도 향상의 문제를 해결하기 위해서 키 입력시 가장 긴 지연을 가지는 구간에 지연시간별로 특수문자를 추가시켜 줌으로서 단순한 조합의 비밀번호를 좀 더 강력하게 만들 수 있었다.

  • PDF

A 4-layer AaMLP for Keystroke Dynamics Identity Verification (4 층 자기연상 다층퍼셉트론을 이용한 키스트로크 기반 사용자 인증)

  • U Eun Cheol;Jo Seong Jun
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.639-644
    • /
    • 2002
  • Password typing is the most wifely ued identity verification method in computer security domain. However, due to its simplicity, it is vulnerable to imposter attacks Keystroke dynamics adds a shield to password. Discriminating imposters from owners is a novelty detection problem. Auto-Associative Multilayer Perceptron (AaMLP) has teen proved to be a good novelty detector. However, the wifely used 2-layer AaMLP cannot identify nonlinear boundaries, which can result in serious problems in computer security. In this paper, a nonlinear model, i.e. 4-layer AaMLP, is proposed to serve as the novelty detector, which can remedy the limitations of 2-layer AaMLP.

  • PDF

A Study on User Authentication based on Keystroke Dynamics of Long and Free Texts (자유로운 문자열의 키스트로크 다이나믹스를 활용한 사용자 인증 연구)

  • Kang, Pil-Sung;Cho, Sung-Zoon
    • IE interfaces
    • /
    • v.25 no.3
    • /
    • pp.290-299
    • /
    • 2012
  • Keystroke dynamics refers to a way of typing a string of characters. Since one has his/her own typing behavior, one's keystroke dynamics can be used as a distinctive biometric feature for user authentication. In this paper, two authentication algorithms based on keystroke dynamics of long and free texts are proposed. The first is the K-S score, which is based on the Kolmogorov-Smirnov test, and the second is the 'R-A' measure, which combines 'R' and 'A' measures proposed by Gunetti and Picardi (2005). In order to verify the authentication performance of the proposed algorithms, we collected more than 3,000 key latencies from 34 subjects in Korean and 35 subjects in English. Compared with three benchmark algorithms, we found that the K-S score was outstanding when the reference and test key latencies were not sufficient, while the 'R-A' measure was the best when enough reference and test key latencies were provided.

User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers (자유로운 문자열의 키스트로크 다이나믹스와 일범주 분류기를 활용한 사용자 인증)

  • Seo, Dongmin;Kang, Pilsung
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.4
    • /
    • pp.280-289
    • /
    • 2016
  • User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.

A Study on the Risk and Countermeasures of Hacking Cable

  • Hea-Jun Kim;Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.75-81
    • /
    • 2023
  • Since the introduction of smartphones, the introduction of charging cable infrastructure that can be used for public use is underway. Thanks to this, people use public cables comfortably without doubt, but most people are not aware of the dangers of public cables. These public cables can lead to infringement accidents such as personal information exposure due to the development of hacking cables, and in the worst case, hackers can take control of smartphones and laptops. This study analyzed the operating principles and attack principles of hacking cables that seem like these general charging cables, but contain malicious scripts or hardware inside. In addition, physical and logical countermeasures were considered based on the analysis.

Analyzing of Hangul Search Query Spelling Error Patterns and Developing Query Spelling Correction System Based on User Logs (한글 검색 질의어 오타 패턴 분석과 사용자 로그를 이용한 질의어 오타 교정 시스템 구축)

  • Jeon, Hee-Won;Huang, Daniel;Rim, Hae-Chang
    • Annual Conference on Human and Language Technology
    • /
    • 2010.10a
    • /
    • pp.15-21
    • /
    • 2010
  • 본 논문은 검색 서비스 기능 중에 빼놓을 수 없는 기능인 한글 검색 질의어(query) 교정 시스템을 '야후!'에서 구축하며 분석한 한글 오타 패턴 그리고 사용자 로그를 기반으로 설계한 질의어 교정 서비스에 대한 설명을 하고 있다. 이 교정 서비스는 현재 '야후! 코리아'에 적용되어 있으며, 한글을 고려한 키스트 로크를 기반으로 한 설계 방식 그리고 동적으로 에러모델을 구축하는 방법을 소개하고 있으며 또한 구축된 모델의 성능을 다른 검색 서비스와 비교한 결과를 소개한다.

  • PDF

Non-memorizing authentication system using the preference words (좋아하는 단어를 이용한 암기하지 않는 패스워드 시스템)

  • Rim, Kwang-Cheol;Lim, Dong-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.3
    • /
    • pp.565-570
    • /
    • 2016
  • User requirements for access and authentication increase daily because of the diversification of the Internet of Things (IoT) and social structures. The increase in authentication needs requires the generation of new passwords. Users want to utilize the same passwords for memorization convenience. However, system administrators request each user to use different passwords, as well as passwords that include special symbols. Differnet passwords and including special symbols passwords seem to exceed the tolerance range within your memorization skills. It fetches a very negative consequences in terms of password management. This paper proposes a preference symbol password system that does not require memorization by users. First, a survey is conducted to prove statistical safety, and based on this, an evolution-type password system that uses preference symbols is designed. Preference symbol passwords show superiority with respect to installation cost and convenience, compared with conventional non-memorizing password systems such as biometrics, keystrokes, and mouse patterns.