Biometric authentication methods application for automated control systems employing keyboard handwriting


DOI: 10.34759/trd-2020-114-18

Аuthors

Solomatin M. S.*, Mitrofanov D. V.**

Air force academy named after professor N.E. Zhukovskii and Y.A. Gagarin, Voronezh, Russia

*e-mail: newmihei@gmail.com
**e-mail: mitrofanovd@mail.ru

Abstract

Information technologies development in many areas of human life activity led to the necessity of automated systems for any process control. The task of information protectiveness, which enters, processes and stored in these systems, becomes up-to-date as well.

Earlier, it was noted in the works that, in our opinion, application of the intellectual detector of the information protecting system in the automated control systems, was up-to-date.

One of the intelligent detector subsystems is the authentication subsystem within the information system. Let us take a closer look at the biometric authentication. These systems are based on unique biometric specifics of the particular person. They can be divided into dynamic ones, which are subjected to changes with time, and static, remaining unchanged.

They can be divided into dynamic, which are subject to change over time, and static, which remain constant.

With authentication in the automated control system, we suggest employing user’s keyboard handwriting, which refers to the person’s dynamic characteristics.

Under the keyboard handwriting we understand a set of dynamic characteristics of the working with the keyboard. The standard keyboard allows measuring the following timing characteristics: the time of holding the pressed key and the time interval between keystrokes.

With this authentication technique employing there is no need to purchase extra expensive equipment. It becomes possible to read user’s dynamic characteristics, using a conventional keyboard that comes with a personal computer, and special software.

At present, three basic authentication algorithms based on the keystroke handwriting are being employed. These are analysis while password entering, analysis, based on entering extra text fragment or phrase, and constant covert monitoring. Each of the algorithms has its pros and contras. System development complexities, operation time, and requirements to the computer speed can be highlighted as the common differences.

Operation of each algorithm is based on comparison with the reference behavioral model.

During operation in the system training mode the user enters certain test phrases, which were prepared in advance and should be changing with the with the passage of time. The text phrases selection is an important stage, since it is necessary to collect sufficient amount of statistic information close to real operation.

After the learning mode, the estimates calculated based on statistical information are compared with the reference ones during the period of the system normal operation at the stage of identification. On their basis, a conclusion is made on the keyboard handwriting parameters match or mismatch.

When statistical data obtained in the course of work differs from the reference behavioral model by more than the value set by the protection system, the user gets a refusal to work, and protection system generates a warning message.

Thus, in our opinion, the user authentication application in automated control system employing the keyboard handwriting is prospective.

Keywords:

automated control system, information security, information system, information systems security, biometric authentication, keyboard handwriting

References

  1. Metodicheskii dokument FSTEK Rossii “Metodika opredeleniya ugroz bezopasnosti informatsii v informatsionnykh sistemakh” (Threats determining techniques to information security in information systems). 2015. URL: https://fstec.ru/component/attachments/download/812

  2. Federal’nyi zakon “Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite informatsii” ot 27.07.2006 № 149-FZ (On information, information technology and information protection). URL: http://www.consultant.ru/document/cons_doc_LAW_61798

  3. Karantaev V.G. Informatizatsiya i sistemy upravleniya v promyshlennosti, 2017, no. 2 (68). URL: https://isup.ru/articles/2/11118/

  4. Chernov D.V., Sychugov A.A. Izvestiya Tul’skogo gosudarstvennogo universiteta, Tekhnicheskie nauki, 2018, no. 10, pp. 58 – 64.

  5. Solomatin M.S., Mitrofanov D.V. Trudy MAI, 2020, no. 110. URL: http://trudymai.ru/published.php?ID=112926. DOI: 10.34759/trd-2020-110-16

  6. Khodashinskii I.A., Savchuk M.V., Gorbunov I.V., Meshcheryakov R.V. Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioelektroniki, 2011, no. 2-3 (24), pp. 236 – 248.

  7. Informatsionnaya bezopasnost’ i zashchita informatsii. URL: https://sites.google.com/site/infobezcom/11-mehanizmy-informacionnoj-bezopasnosti/ tema-12-identifikacia-i-autentifikacia

  8. Ivanov A.I. Biometricheskaya identifikatsiya lichnosti po dinamike podsoznatel’nykh dvizhenii (Biometric personality identification by the subconscious movements dynamics), Penza, Penzenskii gosudarstvennyi universitet, 2006, 186 p.

  9. Novikov A.A., Sharkov A.E., Serdyuk V.A. Tezisy dokladov X yubileinoi konferentsii “Metody i tekhnicheskie sredstva obespecheniya bezopasnosti informatsii”, Saint Petersburg, 2002, pp. 153 – 154.

  10. Sukharevskaya E.V. Mezhdunarodnyi studencheskii nauchnyi vestnik, 2018, no. 2. URL: https://eduherald.ru/ru/article/view?id=18132

  11. Tsannieva G.A., Gasanova N.R. Materialy VIII Mezhdunarodnoi studencheskoi nauchnoi konferentsii “Studencheskii nauchnyi forum”, 2016. URL: http://scienceforum.ru/2016/article/2016029537

  12. Klaviaturnyi pocherk kak sredstvo autentifikatsii. 2012. URL: https://www.securitylab.ru/blog/personal/aguryanov/29985.php

  13. Sabanov A.G. Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioelektroniki, 2012, no, 2-1 (26), pp. 134 – 139.

  14. Bukharin V.V., Kir’yanov A.V., Starodubtsev Yu.I. Trudy MAI, 2012, no. 57. URL: http://trudymai.ru/eng/published.php?ID=31145

  15. Bukharin V.V., Kir’yanov A.V., Starodubtsev Yu.I., Truskov S.S. Trudy MAI, 2012, no. 57. URL: http://trudymai.ru/eng/published.php?ID=31144

  16. Filatov V.I., Borukaeva A.O., Berdikov P.G. Trudy MAI, 2018, no. 103. URL: http://trudymai.ru/eng/published.php?ID=100781

  17. Filatov V.I., Bonch-Bruevich A.M., Khokhlachev E.N., Borukaeva A.O., Berdikov P.G. Trudy MAI, 2020, no. 112. URL: http://trudymai.ru/eng/published.php?ID=116576. DOI: 10.34759/trd-2020-112-17

  18. Skrypnikov A.V., Khvostov V.A., Chernyshova E.V., Samtsov V.V., Abasov M.A. Vestnik Voronezhskogo gosudarstvennogo universiteta inzhenernykh tekhnologii, 2018, vol. 80, no. 4 (78), pp. 96 – 110.

  19. Yashina A.M. Trudy mezhdunarodnogo simpoziuma “Nadezhnost’ i kachestvo”, Penza, Penzenskii gosudarstvennyi universitet, 2018, pp. 104 – 106.

  20. Zhukova P.N., Nasonova V.A., Khodyakova N.V. Problemy pravookhranitel’noi deyatel’nosti, 2015, no. 2, pp. 83 – 88.


Download

mai.ru — informational site MAI

Copyright © 2000-2024 by MAI

Вход