Font Size: a A A

Research On Identity Recognition Based On Keystroke Behavior

Posted on:2019-02-09Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhengFull Text:PDF
GTID:2348330542955546Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the rapid development of information technology,the demand for information security has also increased.Traditional user authentication based on user name and password can no longer meet the current growing security needs.Although other kinds of authentication methods such as dynamic password token and secret security card appear,all these belong to the external physical authentication of the user,and there is a risk of cracking and disclosure.The security of user information is still not guaranteed.In order to improve the security of user identity information,the method of using biometrics to identify users has become a hot research topic.At present,the biometrics are mainly divided into two categories.One is the biophysical features represented by iris,fingerprint,palm print,and voiceprint,etc.Although such biometric information can overcome the defect of the traditional user name and password authentication method,Its cost is high,the implementation complexity and other factors,limiting the application of such safety measures;Second is the biological behavior represented by the user's keystroke behavior,gait,signatures,preferences when the user browses web pages,etc.These behavioral traits have significant differences among different user groups and are more secure and less prone to loss and without having to rely on additional,expensive hardware devices.In this paper,the issue of identity identification in the field of information security,conducted on-the-spot analysis and research on the user's keystroke behavior.It mainly collects user's static keystroke characteristics and dynamic keystroke characteristics under the input of user's static texts and dynamic texts,analyzes and models them separately,and final y realizes the identification of user's identity.It can be for the user identity is intruder fraudulent use and obtain user information to provide prevention and protection,but also can be identified according to different users for the corresponding management and other operations,its practicality,convenience and other characteristics can provide the current technology applications new Ideas and methods.
Keywords/Search Tags:Information security, Identity recognition, Biometrics, Keystroke behavior
PDF Full Text Request
Related items