共查询到17条相似文献,搜索用时 78 毫秒
1.
2.
3.
用户的击键特性犹如指纹,能反映人独特的生理和行为特性.击键特性识别是一种生理统计学技术,它根据敲击键盘的节奏模式来区分不同的人.将击键特性运用于入侵检测能有效地识别用户,减少黑客入侵,防止账户被盗. 相似文献
4.
击键特征是一种能反映用户行为的动态特征,可作为识别用户的信息源。传统方法不仅要求收集大量击键样本来建立识别模型,并且同时需要正例样本与反例样本。但在实际应用中,需要用户提供大量的训练样本是不现实的,并且反例样本收集比正例样本收集困难。为此,提出一种新的以击键序列为信息源的主机入侵检测模型。在小样本和仅有正例的情况下,通过One-Class支持向量机(OCSVM)来训练检测模型,通过对用户的击键行为是否偏离正常模型来检测入侵。仿真实验结果表明该模型具有较好的检测效果。 相似文献
5.
阻止用户在计算机上玩游戏,通常采用判断用户运行的程序的名称来实现,但穷尽所有的游戏名相当困难,且不能检测到新开发的游戏,因此提出了一种通过对用户击键特征检测来判断用户是否在玩游戏的方法。该方法首先截获用户的所有击键消息,记录击键数据,再从这些数据中计算出击键特征描述值,从而和存储的击键特征值对比得出用户是否在玩游戏。实验证明该方法能有效地阻止大多数的键盘控制类游戏,解决了对未知名游戏的监控困难的问题。 相似文献
6.
7.
8.
孙梅玉 《计算机工程与应用》2012,48(20):11-17,22
在时间序列的GMBR表示的基础上,首次提出将基于距离和基于密度的时间序列检测方法结合,给出了时间序列模式异常的定义,并用“异常特征值”来衡量时间序列模式的异常程度.根据所提出的模式异常的定义,在强力搜索算法的基础之上提出了新的时间序列异常检测算法GMBR-DD (Grid Minimum Bounding Rectangle-Discords Detect),该算法将基于距离和基于密度的异常检测方法结合,能够高效地发现时间序列中的异常模式.通过三组实验数据,对提出的异常时间序列定义和时间序列的异常检测算法进行了验证,实验结果表明所提出的时间序列异常检测算法能够有效地发现时间序列的异常变动,为决策提供了很好的平台和有力的工具. 相似文献
9.
为提高真实击键场景中用户的持续身份认证能力,搭建完全自由的实验环境采集击键数据。将连续击键事件中各后置击键的频次作为击键内容特征,将排序后的连续击键时间间隔序列作为击键行为特征,引入改进的Yager证据合成理论融合击键内容域和击键行为域的子分类器得到最终的持续身份认证模型。实验结果表明,与现有的击键认证模型相比,采用融合技术的认证方法提高了用户持续身份认证的准确率,在真实的内网中有应用价值。 相似文献
10.
11.
12.
13.
随着信息化技术不断提高,时序数据规模呈指数级增长,为时间序列异常检测算法发展提供了契机和挑战,也使其逐步成为数据分析领域新增的研究热点。然而,这一方面的研究仍处于初步阶段,研究工作的系统性不强。为此,通过整理和分析国内外文献,将多维时间序列异常检测的研究内容按照逻辑顺序分为“维数约简”“时间序列模式表示”和“异常模式发现”三个方面,并对其主流算法进行梳理和归纳,以全面展现当前异常检测的研究现状和特点。在此基础上,还指出了多维时间序列异常检测算法的研究难点和研究趋势,以期对相关理论和应用研究提供有益的参考。 相似文献
14.
Keystroke dynamics is a behavioural biometric deployed as a software based method for the authentication and/or identification
of a user requesting access to a secured computing facility. It relies on how a user types on the input device (here assumed
to be a PC keyboard)-and makes the explicit assumption that there are typing characteristics that are unique to each individual.
If these unique characteristics can be extracted-then they can be used, in conjunction with the login details to enhance the
level of access security-over and above the possession of the login details alone. Most unique characteristics involve the
extraction of keypress durations and multi-key latencies. These characteristics are extracted during an enrollment phase,
where a user is requested to login into the computer system repeatedly. The unique characteristics then form a string of some
length, proportional to the enrollment character content times the number of attributes extracted. In this study, the deployment
of classical string matching features prevalent in the bioinformatics literature such as position specific scoring matrices
(motifs) and multiple sequence alignments to provide a novel approach to user verification and identification within the context
of keystroke dynamics based biometrics. This study provides quantitative information regarding the values of parameters such
as attribute acceptance thresholds, the number of accepted attributes, and the effect of contiguity. In addition, this study
examined the use of keystroke dynamics as a tool for user identification. The results in this study yield virtually 100% user
authentication and identification within a single framework.
Recommended by Guest Editor Phill Kyu Rhee. The author would like to thank the students at the Polish Japanese Institute of
Information Technology, in Warsaw, Poland for participating in this study.
Kenneth Revett received his Ph.D. degree in Neuroscience from the University of Maryland, College Park in 1999. His research interests include
behavioural biometrics and computational modelling. He is author of the text Behavioral Biometrics: A Remote Access Approach,
holds a UK patent in keystroke dynamics, and has published over 40 papers in the field. 相似文献
15.
在对现有的几类涡旋识别算法进行比较分析的基础上,重点研究了基于Clifford卷积的模板匹配的方法。考虑到实际计算到的流场数据集的不规则性,对基于Clifford卷积的模板匹配的方法加以改进,改由混合网格来划分数据集,对于不规则部分根据临近基元来标度模板,在计算过程中对模板的1-邻域点取样。实验证明,在算法效率相当的前提下,该方法能够更加准确地识别、显示流场的涡旋结构。 相似文献
16.
17.
Epsilon machine is a computational mechanics theory and its most effective reconstruction algorithm is causal state splitting reconstruction (CSSR). As CSSR can only be applied to symbol series, symbolising real series to symbol series is necessary in practice. Epsilon machine discovers the hidden pattern of a system. In reconstructed results, the hidden pattern is expressed as the set of causal states. Based on the variation of causal states, a novel anomaly detection algorithm, structure vector model, is presented. The vector is composed of the causal states, and the anomaly measure is defined with the distance of different vectors. An example of the crankshaft fatigue demonstrates the effectiveness of the model. The mechanism of the model is discussed in detail from three aspects, computational mechanics, symbolic dynamics and complex networks. The new idea defining anomaly measure based on the variation of hidden patterns can be interpreted reasonably with the hierarchical structure of complex networks. The jump in anomaly curves is a nature candidate for the threshold, which confirms the positive meaning of the model. Finally, the parameter choice and time complexity are briefly analysed. 相似文献