Show simple item record

dc.contributor.authorKuzminykh, I
dc.contributor.authorGhita, B
dc.contributor.authorSilonosov, A
dc.date.accessioned2021-05-18T10:49:31Z
dc.date.available2021-05-18T10:49:31Z
dc.date.issued2020-12-07
dc.identifier.urihttp://hdl.handle.net/10026.1/17127
dc.descriptionCopy draft with 10 pages, 4 figures,35 references
dc.description.abstract

Authentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, can be used in remote display access to guarantee the security of use of remote connectivity systems during the access control phase or throughout the session. This paper investigates how network conditions and additional host interaction may impact the behavioural pattern of keystrokes when used in a remote desktop application scenario. We focus on the timing of adjacent keys and investigate this impact by calculating the variations of the Euclidean distance between a reference profile and resulting profiles following such impairments. The experimental results indicate that variations of congestion latency, whether produced by adjacent traffic sources or by additional remote desktop interactions, have a substantive impact on the Euclidian distance, which in turn may affect the effectiveness of the biometric authentication algorithm. Results also indicate that data flows within remote desktop protocol are not prioritized and therefore additional traffic will have a significant impact on the keystroke timings, which renders continuous authentication less effective for remote access and more appropriate for one-time login.

dc.language.isoen
dc.subjectcs.CR
dc.subjectcs.CR
dc.titleImpact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions
dc.typejournal-article
plymouth.author-urlhttp://arxiv.org/abs/2012.03577v1
plymouth.volumeabs/2012.03577
plymouth.journalCoRR
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-01-01
dc.rights.embargodate2022-1-21
dc.rights.embargoperiodNot known
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-12-07
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV