Abstract
To detect the novel impostors whose data patterns have never been learned previously in keystroke dynamics, two solutions are proposed in this paper. Unlike most other research in keystroke dynamics, this paper surveys the performance tradeoff and time consumption, which are valuable for practical implementation, of the solutions. Besides, it is our intention to attempt verifying computer users’ identities based on pure numeric password which is more difficult than verification of any other kinds of passwords.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Obaidat, M.S., Sadoun, B.: Verification of Computer Users Using Keystroke Dynamics. IEEE Trans. on Systems, Man and Cybernetics 27(2), 261–269 (1997)
Platt, J.C.: Fast training of support vector machines using sequential minimal optimization. In: Schölkopf, B., et al. (eds.) Advances in Kernel Methods-Support Vector Machine, pp. 185–208. MIT Press, Cambridge (1999a)
Schölkopf, B., Platt, J., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a High-Dimensional Distribution. Neural Comput. 13(7), 1443–1472 (2001)
Sang, Y., Fan, P., Hao, L.: Keystroke Characteristics Identity Authentication Based on Levenberg-Marquardt Algorithm. Computer Applications 24(7), 1–3 (2004) (in Chinese)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sang, Y., Shen, H., Fan, P. (2004). Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine. In: Liew, KM., Shen, H., See, S., Cai, W., Fan, P., Horiguchi, S. (eds) Parallel and Distributed Computing: Applications and Technologies. PDCAT 2004. Lecture Notes in Computer Science, vol 3320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30501-9_128
Download citation
DOI: https://doi.org/10.1007/978-3-540-30501-9_128
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24013-6
Online ISBN: 978-3-540-30501-9
eBook Packages: Computer ScienceComputer Science (R0)