Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

User authentication based on the three-stage keyboarding model

https://doi.org/10.21822/2073-6185-2020-47-3-39-48

Abstract

Objective. The article offers a three-stage model that allows increasing the effectiveness of authentication in the implementation of distance learning systems, not only in automatic proctoring systems but also in complex information systems of critical objects. Methods. Increasing the effectiveness of user authentication is achieved by increasing the accuracy of authentication using keyboarding. Results. The proposed model will help to implement the process of access differentiation for fraudsters and legal users, by adapting to the slightest changes in the keyboarding parameters, which allows increasing the authentication accuracy. During testing, one of the tested users was authenticated using a deviation comparison, while the other three users were authenticated using the χcriterion. The remaining users were not able to complete the authentication procedure at all stages of the system. Conclusion. The results of an experimental study showed the high ability of the proposed model of access control for legitimate users and attackers with some minor changes in the parameters of the keystrokes dynamics, improving the accuracy of user authentication. The user authentication reliability in practice was 97.5%.

About the Authors

A. R. Abzalov
A.N. Tupolev Kazan National Research Technical University
Russian Federation

Airat R. Abzalov - Senior Lecturer, Department of Information Security Systems.
10 Karl Marx St., Kazan 420111.



I. I. Kashapov
A.N. Tupolev Kazan National Research Technical University
Russian Federation

Ilnaz I. Kashapov – student.
10 Karl Marx St., Kazan 420111.



A. Yu. Orlov
A.N. Tupolev Kazan National Research Technical University
Russian Federation

Artemy Yu. Orlov – student.
10 Karl Marx St., Kazan 420111.



I. R. Mamleev
A.N. Tupolev Kazan National Research Technical University
Russian Federation

Iskander R. Mamleev – student.
10 Karl Marx St., Kazan 420111.



References

1. Glova V.I., Katasev A.S., Abzalov A.R. Model' lokalizatsii iskazheniy i podtverzhdeniya avtorstva iskhodnykh tekstov programm // Vestnik Kazanskogo gosudarstvennogo tekhnicheskogo universiteta im. A.N. Tupoleva. 2008. № 3. S. 84-87. [Glova V.I., Katasev A.S., Abzalov A.R. Model for localization of distortions and confirmation of authorship of source codes of programs // Bulletin of Kazan State Technical University. A.N. Tupolev. 2008. No. 3. S. 84-87.(In Russ)]

2. Dobrovinskiy D.S., Lovetskiy I.V., Popov M.A. Proktoring kak instrument razvitiya distantsionnogo obrazovaniya // Nauchno-tekhnicheskoye i ekonomicheskoye sotrudnichestvo stran ATR v XXI veke. 2018. S. 27-32. [Do-brovinsky D.S., Lovetsky I.V., Popov M.A. Proctoring as a tool for the development of distance education // Scientific, technical and economic cooperation of the Asia-Pacific countries in the XXI century. 2018.S. 27-32. .(In Russ)]

3. Tumbinskaya M.V. Podderzhka prinyatiya resheniy i modelirovaniye obespecheniya zashchity informatsii v in-formatsionnykh sistemakh internet-bankinga // Vestnik komp'yuternykh i informatsionnykh tekhnologiy. 2015. №7 (133). S. 33-39. [Tumbinskaya M.V. Decision support and modeling of information security in information systems of Internet banking // Bulletin of computer and information technologies. 2015. No. 7 (133). S. 33-39. .(In Russ)]

4. Tumbinskaya M.V., Bayanov B.I., Rakhimov R.ZH., Kormil'tsev N.V., Uvarov A.D. Analiz i prognozirovaniye vredonosnogo setevogo trafika v oblachnykh servisakh // Biznes-informatika. 2019. № 1. S. 71-81. [Tumbinskaya M.V., Bayanov B.I., Rakhimov R.Zh., Kormiltsev N.V., Uvarov A.D. Analysis and prediction of malicious network traffic in cloud services // Business Informatics. 2019.No. 1.P. 71-81. .(In Russ)]

5. R.R. Sharipov, M.V. Tumbinskaya, A.R. Abzalov Analysis of users keyboard handwriting based on Gaussian reference signals // International Russian Automation Conference. RusAutoCon. 2019.

6. Tumbinskaya M.V. Cistemnyy podkhod k obespecheniyu zashchity ot nezhelatel'noy informatsii v sotsial'nykh setyakh // Voprosy kiberbezopasnosti. 2017. №2 (20). S. 30-44. [Tumbinskaya M.V. A systematic approach to ensuring protection against unwanted information in social networks // Cybersecurity Issues. 2017. No. 2 (20). S. 30-44. (In Russ)]

7. Tumbinskaya M.V. Model' zashchishchennoy informatsionnoy sistemy internet-bankinga // Prikladnaya informat-ika. 2015. № 5 (59). S. 62-72. [Tumbinskaya M.V. Model of a secure information system for Internet banking // Applied Informatics. 2015. No. 5 (59). S. 62-72. (In Russ)]

8. Sharipov R.R., Safiullin N.Z. Apparaturnyy analiz klaviaturnogo pocherka s ispol'zovaniye etalonnykh gaussovskikh signallov // Vestnik Kazanskogo gosudarstvennogo tekhnicheskogo universiteta im. A.N. Tupoleva, 2006. № 2. S. 21-23. [Sharipov R.R., Safiullin N.Z. Instrumental analysis of keyboard handwriting using standard Gaussian signals. Bulletin of Kazan State Technical University. A.N. Tupolev, 2006. No. 2. S. 21-23. .(In Russ)]

9. Sharipov R.R., Katasov A.S. Sistema raspoznavaniya klaviaturnogo pocherka pol'zovateley na osnove poligaussovogo algoritma // Vestnik Kazanskogo gosudarstvennogo energeticheskogo universiteta. 2016. № 4 (32). S. 45-59. [Sharipov R.R., Katasev A.S. A system for recognizing the keyboard handwriting of users based on the poly-Gaussian algorithm // Bulletin of Kazan State Power Engineering University. 2016. No. 4 (32). S. 4559. (In Russ)]

10. Tumbinskaya M.V. Obespecheniye zashchity ot nezhelatel'noy informatsii v sotsial'nykh setyakh // Vestnik Mor-dovskogo universiteta. 2017. T. 27. № 2. S. 264-288. [Tumbinskaya M.V. Providing protection against unwanted information in social networks // Bulletin of the Mordovian University. 2017.Vol. 27.No. 2.P. 264-288. (In Russ)]

11. Mukhamatkhanov R.M., Mikhaylov A.A., Bayanov B.I., Tumbinskaya M.V. Klassifikatsiya DDos-atak na osnove neyrosetevoy modeli // Prikladnaya informatika. 2019. № 1 (79). S. 96-103. [Mukhamatkhanov R.M., Mikhailov A.A., Bayanov B.I., Tumbinskaya M.V. Classification of DDos attacks based on a neural network model // Applied Informatics. 2019. No. 1 (79). S. 96-103.(In Russ)]

12. Berman G.N. Sbornik zadach po kursu matematicheskogo analiza. Moskva: Nauka, 1977 416c. [Berman G.N. Collection of problems for the course of mathematical analysis. Moscow: Nauka, 1977 416c. (In Russ)]


Review

For citations:


Abzalov A.R., Kashapov I.I., Orlov A.Yu., Mamleev I.R. User authentication based on the three-stage keyboarding model. Herald of Dagestan State Technical University. Technical Sciences. 2020;47(3):39-48. (In Russ.) https://doi.org/10.21822/2073-6185-2020-47-3-39-48

Views: 694


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)