Show simple item record

dc.contributor.authorKuzminykh, I
dc.contributor.authorGhita, B
dc.contributor.authorSilonosov, A
dc.contributor.editorSubbotin S
dc.date.accessioned2022-11-07T12:02:59Z
dc.date.available2022-11-07T12:02:59Z
dc.date.issued2021
dc.identifier.issn1613-0073
dc.identifier.urihttp://hdl.handle.net/10026.1/19878
dc.description.abstract

The paper investigates the impact of network traffic and network characteristics on the effectiveness of keystroke dynamics for continuous and one-time authentication in the remote desktop applications and virtual desktop infrastructure. The context presented in the paper contributes to the area of biometric authentication systems by identifying virtual desktop environment as a specific application domain that uses a keystroke pattern for user verification and identifying at what extent the context influences on permanence and the immunity of the keystroke data which was never studied before. The results showed that the keystroke pattern is not affected by network latency, but standard deviation, jitter, and packet loss have a significant combined impact onto it. It can also be concluded that RDP packets are not prioritized during transmission over the network, and therefore, we can say that any other competing traffic is likely to render keystroke dynamics unusable for continuous authentication during remote access.

dc.format.extent238-248
dc.language.isoen
dc.publisherPublishing House Helvetica (Publications)
dc.titleOn Keystroke Pattern Variability in Virtual Desktop Infrastructure
dc.typeconference
dc.typeConference Proceeding
plymouth.volume2864
plymouth.publisher-urlhttp://ceur-ws.org/Vol-2864
plymouth.publication-statusPublished
plymouth.journalComputer Modeling and Intelligent Systems
dc.identifier.doi10.32782/cmis/2864-21
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.32782/cmis/2864-21
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV