Обзор методов идентификации пользователя на основе цифровых отпечатков
- Авторы: Осин А.В.1, Мурашко Ю.В.1
-
Учреждения:
- Московский технический университет связи и информатики
- Выпуск: Том 9, № 5 (2023)
- Страницы: 91-111
- Раздел: Статьи
- URL: https://journals.rcsi.science/1813-324X/article/view/254399
- ID: 254399
Цитировать
Полный текст
Аннотация
Рассмотрены методы идентификации пользователей на основе цифровых отпечатков. Представлены основные подходы для формирования последних для браузера, который установлен на пользовательском устройстве и характеризует его принадлежность. Также описаны методы, применяемые для идентификации человека (пользователя) в процессе эксплуатации устройства. Представлены методы, использующие как динамику нажатий клавиш и взаимодействий с сенсорным экраном, голосовые и геолокационные данные, так и поведенческую биометрию и поведенческий профиль. В качестве развития подхода идентификации описана концепция непрерывной аутентификации. Приводится список общедоступных наборов данных, упоминаемых в рассмотренных в обзоре исследованиях, с указание ссылок для их скачивания. Приводится обширный список работ, отражающих современное состояние исследований в области цифровых отпечатков.
Ключевые слова
Об авторах
А. В. Осин
Московский технический университет связи и информатики
Email: a.v.osin@mtuci.ru
ORCID iD: 0000-0002-6384-9365
SPIN-код: 7775-2394
Ю. В. Мурашко
Московский технический университет связи и информатики
Email: u.v.murashko@edu.mtuci.ru
ORCID iD: 0009-0003-6448-8412
Список литературы
- Агафонов Ю.М. Деанонимизация пользователей на основе цифровых отпечатков браузера // XVI Всероссийская научно-практическая конференция студентов, аспирантов, молодых ученых «Безопасность информационного пространства – 2017» (Екатеринбург, Российская Федерация, 12 декабря 2017). Екатеринбург: Изд-во Урал. ун-та, 2018. С. 3−5.
- Алисултанова Э.Д., Исаева М.З., Болтиев Д.У. Анализ систем автономной идентификации пользователя сайта // Электронная наука. 2021. Т. 2. № 2. С. 7.
- Ишкуватов С.М., Комаров И.И. Анализ аутентичности трафика на основании данных цифровых отпечатков реализаций сетевых протоколов // Научно-технический вестник информационных технологий, механики и оптики. 2020. Т. 20. № 5. С. 747−754. doi: 10.17586/2226-1494-2020-20-5-747-754
- Балмаев И.Т. Идентификация пользователей сети Tor на основе параметров перехваченного трафика // Межвузовская научно-техническая конференция студентов, аспирантов и молодых специалистов им. Е.В. Арменского (Москва, Российская Федерация,17 февраля – 01 марта 2017). Москва: Московский институт электроники и математики НИУ ВШЭ, 2017. С. 372‒373.
- Шулицкий Д.С., Водейко А.Э. Методы защиты авторского права на программные продукты с помощью водяных знаков и отпечатков пальцев. 2019. URL: https://libeldoc.bsuir.by/bitstream/123456789/37230/1/Shulitskiy_Metody.pdf (дата обращения 20.10.2023)
- Гусев П.Д. Обзор существующих алгоритмов построения цифровых отпечатков // Безопасность информационных технологий. 2015. Т. 22. № 4. С. 63‒67.
- Борисова С.Н. Методы защиты аудиофайлов от несанкционированного копирования и распространения // Фундаментальные исследования. 2015. № 5-3. С. 481−487.
- Eckersley P. How Unique Is Your Web Browser? // Proceedings of the 10th International Symposium on Privacy Enhancing Technologies Symposium (PETS 2010, Berlin, Germany, 21−23 July 2010). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2010. Vol. 6205. PP. 1−18. doi: 10.1007/978-3-642-14527-8_1
- Mowery K., Shacham H. Pixel Perfect: Fingerprinting Canvas in HTML5 // Proceedings of W2SP. 2012. URL: https://api.semanticscholar.org/CorpusID:1399943 (Accessed 20.10.2023)
- Cao Y., Li S., Wijmans E. (Cross-) Browser Fingerprinting via OS and Hardware Level Features // NDSS’ 2017 (26 February − 1 March 2017, San Diego, USA). 2017. doi: 10.14722/ndss.2017.23152
- Englehardt S., Narayanan A. Online tracking: A 1-million-site Measurement and Analysis // Proceedings of the Conference on Computer and Communications Security (2016 ACM SIGSAC, Vienna, Austria, 24−28 October 2016). New York: Association for Computing Machinery, 2016. PP. 1388−1401. doi: 10.1145/2976749.2978313
- Sjösten A., Van Acker S., Sabelfeld A. Discovering Browser Extensions via Web Accessible Resources // Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY '17, Scottsdale, USA, 22−24 March 2017). New York: Association for Computing Machinery, 2017. PP. 329−336. doi: 10.1145/3029806.3029820
- Sanchez-Rola I., Santos I., Balzarotti D. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies // Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security 17, Vancouver, Canada, 16−18 August 2017). Berkeley: USENIX Association, 2017. PP. 679−694.
- Starov O., Nikiforakis N. Xhound: Quantifying the Fingerprintability of Browser Extensions // Proceedings of the Symposium on Security and Privacy (SP, San Jose, USA, 22−26 May 2017). IEEE, 2017. PP. 941−956. doi: 10.1109/SP.2017.18
- Mowery K., Bogenreif D., Yilek S., Shacham H. Fingerprinting Information in JavaScript Implementations. 2012. URL: https://search.iczhiku.com/paper/hgdOSDNQ7g2K8zv8.pdf (Accessed 20.10.2023)
- Nakibly G., Shelef G., Yudilevich S. Hardware Fingerprinting Using HTML5 // arXiv:1503.01408. 2015. doi: 10.48550/arXiv.1503.01408
- Olejnik Ł., Acar G., Castelluccia C., Diaz C. The leaking battery // Proceedings of the International Workshop on Data Privacy Management International Workshop on Quantitative Aspects in Security Assurance. 2015. С. 254−263. doi: 10.1007/978-3-319-29883-2_18
- Vastel A., Laperdrix P., Rudametkin W., Rouvoy R. FP-STALKER: Tracking Browser Fingerprint Evolutions // Proceedings of the Symposium on Security and Privacy (SP, San Francisco, USA, 20−24 May 2018). IEEE, 2018. PP. 728−741. doi: 10.1109/SP.2018.00008
- Laperdrix P., Rudametkin W., Baudry B. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints // Proceedings of the Symposium on Security and Privacy (SP, San Jose, USA, 22−26 May 2016). IEEE, 2016. PP. 878−894. doi: 10.1109/SP.2016.57
- Gómez-Boix A., Laperdrix P., Baudry B. Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale // Proceedings of the World Wide Web Conference (Lyon, France, 23−27 April 2018). 2018. PP. 309−318. doi: 10.1145/3178876.3186097
- A look into several Angler Exploit Kit malvertising campaigns // Operation Fingerprint. 2016. URL: https://malwarebytes.app.box.com/v/operation-fingerprint (дата обращения 26.04.2023)
- ThreatMetrix − Cybersecurity Risk Management // LexisNexis Risk Solutions. URL: https://risk.lexisnexis.com/products/threatmetrix (дата обращения 26.04.2023)
- The Evolution of Hi-Def Fingerprinting in Bot Mitigation // Imperva. 2018. URL: https://www.imperva.com/blog/the-evolution-of-hi-def-fingerprinting-in-bot-mitigation (дата обращения 26.04.2023)
- Track Devices // MaxMind. 2023. URL: https://dev.maxmind.com/minfraud/track-devices (дата обращения 26.04.2023)
- Safeguard Websites, Mobile Apps & APIs From Bots // HUMAN Bot Defender. 2023. URL: https://www.humansecurity.com/products/human-bot-defender#scroll-down (дата обращения 26.04.2023)
- Device Fingerprint // IPQualityScore. 2023. URL: https://www.ipqualityscore.com/device-fingerprinting (дата обращения 26.04.2023)
- Comprehensive Bot Management // Radware. 2023. URL: https://www.radware.com/products/bot-manager (дата обращения 26.04.2023)
- Fraud Detection Software for Secure Growth // Sift. 2023. URL: https://sift.com/products/digital-trust-safety-platform (дата обращения 26.04.2023)
- Device Recognition // SecurAuth. 2023. URL: https://docs.secureauth.com/2104/en/device-recognition.html (дата обращения 26.04.2023)
- TruValidate // TransUnion. 2023. URL: https://www.transunion.com/solution/truvalidate (дата обращения 26.04.2023)
- Murashko Yu.V., Papaev B.N. Increasing the accuracy of user identification by digital fingerprint using a two-stage approach // X International Scientific and Practical Conference "Prospective scientific research: experience, problems and prospects of development". 2023. С. 191-195.
- Murashko Yu.V. Идентификация пользователей в сетевом трафике // Всероссийская научно-техническая конференция «Актуальные проблемы радиоэлектроники и телекоммуникаций» (Самара, Российская Федерация, 25–28 апреля 2023). 2023. С. 166–169.
- Sultana M., Paul P.P., Gavrilova M. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends // Proceedings of the International Conference on Cyberworlds (Santander, Spain, 06−08 October 2014). IEEE, 2014. PP. 271−278. doi: 10.1109/CW.2014.44
- Мурашко Ю.В. Идентификация пользователей сети по их поведению // IX Всероссийская научно-техническая конференция «Фундаментальные и прикладные аспекты компьютерных технологий и информационной безопасности» (Таганрог, Российская Федерация, 10–15 апреля 2023). Ростов-на-Дону: Южный федеральный университет, 2023. С. 54−56.
- Rybnik M., Tabedzki M., Adamski M., Saeed K. An Exploration of Keystroke Dynamics Authentication Using Non-fixed Text of Various Length // Proceedings of the International Conference on Biometrics and Kansei Engineering (Tokyo, Japan, 05−07 July 2013). IEEE, 2013. PP. 245−250. doi: 10.1109/ICBAKE.2013.48
- Shimshon T., Moskovitch R., Rokach L., Elovici Y. Continuous Verification Using Keystroke Dynamics // Proceedings of the International Conference on Computational Intelligence and Security (Nanning, China, 11−14 December 2010). IEEE, 2010. PP. 411−415. doi: 10.1109/CIS.2010.95
- Teh P.S., Teoh A.B.J., Yue S. A Survey of Keystroke Dynamics Biometrics // The Scientific World Journal. 2013. Vol. 2013. P. 408280. doi: 10.1155/2013/408280
- Tsimperidis I., Yoo P.D., Taha K., Mylonas A., Katos V. R2BN: An adaptive Model for Keystroke-Dynamics-Based Educational Level Classification // IEEE Transactions on Cybernetics. 2018. Vol. 50. Iss. 2. PP. 525−535. doi: 10.1109/TCYB.2018.2869658
- Alshanketi F., Traore I., Ahmed A.A. Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication // Proceedings of the IEEE Security and Privacy Workshops (SPW, San Jose, USA, 22−26 May 2016). IEEE, 2016. С. 66−73. doi: 10.1109/SPW.2016.12
- Ali M.L., Thakur K., Tappert C.C., Qiu M. Keystroke Biometric User Verification Using Hidden Markov Model // Proceedings of the 3rd International Conference on Cyber Security and Cloud Computing (CSCloud, Beijing, China, 25−27 June 2016). IEEE, 2016. PP. 204−209. doi: 10.1109/CSCloud.2016.23
- Krishnamoorthy S., Rueda L., Saad S., Elmiligi H. Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning // Proceedings of the 2nd International Conference on Biometric Engineering and Applications (ICBEA '18, Amsterdam, Netherlands, 16−18 May 2018). New York: Association for Computing Machinery, 2018. PP. 50‒57. doi: 10.1145/3230820.3230829
- Higashino J. Signature Verification System on Neuro-Computer // Proceedings of the 11th International Conference on Pattern Recognition (IAPR, Hague, Netherlands, 30 August ‒ 3 September 1992). Vol. 3. 1992. PP. 517‒521.
- Everitt R.A.J., McOwan P.W. Java-based internet biometric authentication system // IEEE Transactions on Pattern Analysis and Machine Intelligence. 2003. Vol. 25. Iss. 9. PP. 1166‒1172. doi: 10.1109/TPAMI.2003.1227991
- Ahmed A.A.E., Traore I. A New Biometric Technology Based on Mouse Dynamics // IEEE Transactions on Dependable and Secure Computing. 2007. Vol. 4. Iss. 3. PP. 165‒179. doi: 10.1109/TDSC.2007.70207
- Antal M., Szabó L.Z. Biometric Authentication Based on Touchscreen Swipe Patterns // Procedia Technology. 2016. Vol. 22. PP. 862‒869. doi: 10.1016/j.protcy.2016.01.061
- Khan H., Hengartner U. Towards application-centric implicit authentication on smartphones // Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (Santa Barbara, USA, 26‒27 February 2014). New York: Association for Computing Machinery, 2014. P. 10. PP. 1‒6. doi: 10.1145/2565585.2565590
- Ferrero R., Gandino F., Montrucchio B., Rebaudengo M., Velasco A., Benkhelifa I. On gait recognition with smartphone accelerometer // Proceedings of the 4th Mediterranean Conference on Embedded Computing (MECO, Budva, Montenegro, 14‒18 June 2015). IEEE, 2015. PP. 368‒373. doi: 10.1109/MECO.2015.7181946
- Fantana A.L., Ramachandran S., Schunck C.H., Talamo M. Movement based biometric authentication with smartphones // Proceedings of the International Carnahan Conference on Security Technology (ICCST, Taipei, Taiwan, 21‒24 September 2015). IEEE, 2015. PP. 235‒239. doi: 10.1109/CCST.2015.7389688
- Laghari A., Waheed-ur-Rehman, Memon Z.A. Biometric authentication technique using smartphone sensor // Proceedings of the 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST, Islamabad, Pakistan, 12‒16 January 2016). IEEE, 2016. PP. 381‒384. doi: 10.1109/IBCAST.2016.7429906
- Hong F., Wei M., You S., Feng Y., Guo Z. Waving authentication: your smartphone authenticate you on motion gesture // Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (Seoul, Republic of Korea, 18‒23 April 2015). New York: Association for Computing Machinery, 2015. PP. 263‒266. doi: 10.1145/2702613.2725444
- Ehatisham-ul-Haq M., Azam M.A., Naeem U., Amin Y., Loo J. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing // Journal of Network and Computer Applications. 2018. Vol. 109. PP. 24‒35. doi: 10.1016/j.jnca.2018.02.020
- Feng T., Zhao X., Shi W. Investigating Mobile Device Picking-up motion as a novel biometric modality // Sixth International Conference on Biometrics on Theory, Applications and Systems (BTAS, Arlington, USA, 29 September ‒ 02 October 2013). IEEE, 2013. doi: 10.1109/BTAS.2013.6712701
- Oak R., Khare M. A Novel Architecture for Continuous Authentication Using Behavioural Biometrics // Proceedings of the International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC, Mysore, India, 8‒9 September 2017). 2017. PP. 767‒771. doi: 10.1109/CTCEEC.2017.8455040
- Reynolds D.A. An Overview of Automatic Speaker Recognition Technology // Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP, Orlando, USA, 13‒17 May 2002). IEEE, 2002. Vol. 4. PP. 4072‒4075.
- Ravanelli M., Bengio Y. Speaker Recognition from Raw Waveform with SincNet // Proceedings of the Spoken Language Technology Workshop (SLT, Athens, Greece, 18‒21 December 2018). IEEE, 2018. PP. 1021‒1028. doi: 10.1109/SLT.2018.8639585
- Arik S., Chen J., Peng K., Ping W., Zhou Y. Neural Voice Cloning with a Few Samples // Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018, Montréal, Canada, 3‒8 December 2018). 2018. Vol. 31.
- Hu Q., Marchi E., Winarsky D., Stylianou Y., Naik D., Kajarekar S. Neural Text-to-Speech Adaptation from Low Quality Public Recordings // Proceedings of the 10th ISCA Workshop on Speech Synthesis (SSW 10, Vienna, Austria, 20‒22 September 2019). 2019. Vol. 10. PP. 24‒28. doi: 10.21437/SSW.2019-5
- Kameoka H. Stargan-vc: Non-parallel many-to-many voice conversion using star generative adversarial networks // Proceedings of the Spoken Language Technology Workshop (SLT, Athens, Greece, 18‒21 December 2018). IEEE, 2018. PP. 266−273. doi: 10.1109/SLT.2018.8639535
- Rebryk Y., Beliaev S. Convoice: Real-Time Zero-Shot Voice Style Transfer with Convolutional Network // arXiv:2005.07815. 2020. doi: 10.48550/arXiv.2005.07815
- Wu D.Y., Chen Y.H., Lee H.Y. Vqvc+: One-Shot Voice Conversion by Vector Quantization and U-Net Architecture // arXiv:2006.04154. 2020. doi: 10.48550/arXiv.2006.04154
- Wenger E., Bronckers M., Cianfarani C., Cryan J., Sha A., Zheng H., et al. "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World // Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (Virtual Event Republic of Korea, 15−19 November 2021). New York: Association for Computing Machinery, 2021. PP. 235−251. doi: 10.1145/3460120.3484742
- Janicki A., Alegre F., Evans N. An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks // Security and Communication Networks. 2016. Vol. 9. Iss. 15. PP. 3030−3044. doi: 10.1002/sec.1499
- Kinnunen T., Sahidullah M., Delgado H., Todisco M., Evans N. Yamagishi J., et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection. 2017. URL: https://www.eurecom.fr/~evans/papers/pdfs/5235.pdf (дата обращения 22.10.2023)
- Gao Y., Lian J., Raj B., Singh R. Detection and Evaluation of Human and Machine Generated Speech in Spoofing Attacks on Automatic Speaker Verification Systems // Proceedings of the Spoken Language Technology Workshop (SLT, Shenzhen, China, 19−22 January 2021). IEEE, 2021. PP. 544−551. doi: 10.1109/SLT48900.2021.9383558
- Vestman V., Kinnunen T., Hautamäki R.G., Sahidullah Md. Voice Mimicry Attacks Assisted by Automatic Speaker Verification // Computer Speech & Language. 2020. Vol. 59. PP. 36−54. doi: 10.1016/j.csl.2019.05.005
- Masuko T., Hitotsumatsu T., Tokuda K., Kobayashi T. On the security of HMM-based speaker verification systems against imposture using synthetic speech // Proceedings of the Sixth European Conference on Speech Communication and Technology (EUROSPEECH 1999, Budapest, Hungary, 5-9 September 1999). 1999.
- Mukhopadhyay D., Shirvanian M., Saxena N. All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines // Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015, Vienna, Austria, 21−25 September 2015). Lecture Notes in Computer Science. Cham: Springer, 2015. Vol. 9327. PP. 599−621. doi: 10.1007/978-3-319-24177-7_30
- Partila P., Tovarek J., Ilk G.H., Rozhon J., Voznak M. Deep Learning Serves Voice Cloning: How Vulnerable Are Automatic Speaker Verification Systems to Spoofing Trials? // IEEE Communications Magazine. 2020. Vol. 58. Iss. 2. PP. 100‒105. doi: 10.1109/MCOM.001.1900396
- Ahmed M.E., Kwak I.Y., Huh J.H., Kim I., Oh T., Kim H. Void: A fast and light voice liveness detection system // Proceedings of the 29th USENIX Security Symposium (USENIX Security, 12–14 August 2020). 2020. PP. 2685‒2702.
- AlBadawy E.A., Lyu S., Farid H. Detecting AI-Synthesized Speech Using Bispectral Analysis // Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 2019. PP. 104‒109.
- Huang C., Lin Y.Y., Lee H., Lee L. et al. Defending Your Voice: Adversarial Attack on Voice Conversion // Proceedings of the Spoken Language Technology Workshop (SLT, Shenzhen, China, 19−22 January 2021). IEEE, 2021. PP. 552‒559. doi: 10.1109/SLT48900.2021.9383529
- Kobayashi R., Yamaguchi R.S. A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User // Proceedings of the Third International Symposium on Computing and Networking (CANDAR, Sapporo, Japan, 08‒11 December 2015). IEEE, 2015. PP. 463‒469. doi: 10.1109/CANDAR.2015.45
- Bassu D., Cochinwala M., Jain A. A new mobile biometric based upon usage context // Proceedings of the International Conference on Technologies for Homeland Security (HST, Waltham, USA, 12‒14 November 2013). IEEE, 2013. PP. 441‒446. doi: 10.1109/THS.2013.6699045
- Branscomb A.S. Behaviorally Identifying Smartphone Users. Master’s Thesis. Raleigh: North Carolina State University, 2013.
- Neal T.J., Woodard D.L., Striegel A.D. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits // Proceedings of the 7th International Conference on Biometrics Theory, Applications and Systems (BTAS, Arlington, USA, 08‒11 September 2015). IEEE, 2015. PP. 1‒6. doi: 10.1109/BTAS.2015.7358777
- Fridman L., Weber S., Greenstadt R., Kam M. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location // IEEE Systems Journal. 2016. Vol. 11. Iss. 2. PP. 513‒521. doi: 10.1109/JSYST.2015.2472579
- Brocardo M.L., Traore I., Saad S., Woungang I. Authorship verification for short messages using stylometry // Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS, Athens, Greece, 07‒08 May 2013. IEEE, 2013. PP. 1‒6. doi: 10.1109/CITS.2013.6705711
- Cao H., Bao T., Yang Q., Chen E. An effective approach for mining mobile user habits // Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010, Toronto, Canada, 26‒30 October 2010). New York: Association for Computing Machinery, 2010. PP. 1677‒1680. doi: 10.1145/1871437.1871702
- Jang J., Yun J., Woo J., Kim H.K. Andro-profiler: anti-malware system based on behavior profiling of mobile malware // Proceedings of the 23rd International Conference on World Wide Web (WWW '14 Companion, Seoul, Korea, 7‒11 April 2014). New York: Association for Computing Machinery, 2014. PP. 737‒738. doi: 10.1145/2567948.2579366
- UMDAA-02 Dataset // Github. 2018. URL: https://umdaa02.github.io (дата обращения 26.04.2023)
- BiDAlab/HuMIdb // Github. 2020. URL: https://github.com/BiDAlab/HuMIdb (дата обращения 26.04.2023)
- BiDAlab/MobileB2C_BehavePassDB // Github. 2022. URL: https://github.com/BiDAlab/MobileB2C_BehavePassDB (дата обращения 26.04.2023)
- Mahbub U., Sarkar S., Patel V.M., Chellappa R. Active user authentication for smartphones: A challenge data set and benchmark results // Proceedings of the 8th international conference on biometrics theory, applications and systems (BTAS, Niagara Falls, USA, 06‒09 September 2016). IEEE, 2016. PP. 1‒8. doi: 10.1109/BTAS.2016.7791155
- Acien A., Morales A., Fierrez J., Vera-Rodriguez R., Delgado-Mohatar O. BeCAPTCHA: Behavioral bot detection using touchscreen and mobile sensors benchmarked on HuMIdb // Engineering Applications of Artificial Intelligence. 2021. Vol. 98. P. 104058. doi: 10.1016/j.engappai.2020.104058
- Stragapede G., Vera-Rodriguez R., Tolosana R., Morales A. BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation // Pattern Recognition. 2023. Vol. 134. P. 109089. doi: 10.1016/j.patcog.2022.109089
- Ananya S.S. Keystroke Dynamics for Continuous Authentication // Proceedings of the 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence, Noida, 11‒12 January 2018). IEEE, 2018. PP. 205‒208. doi: 10.1109/CONFLUENCE.2018.8442703
- Mondal S., Bours P. Continuous authentication using mouse dynamics // Proceedings of the International Conference of the BIOSIG Special Interest Group (BIOSIG, Darmstadt, Germany, 05‒06 September 2013). IEEE, 2013. PP. 1‒12.
- Plurilock AI ‒ Least privilege CASB, DLP with DEFEND technology // Plurilock. 2016. URL: https://plurilock.com (дата обращения 26.04.2023)
- ThreatMark Fraud Prevention Solution // ThreatMark. 2015. URL: https://www.threatmark.com (дата обращения 26.04.2023)
- VoiSentry // Aculab. 2018. URL: https://www.aculab.com/biometric-technologies/voisentry (дата обращения 26.04.2023)
- User Behavior Analytics (UBA) // Cynet. 2018. URL: https://www.cynet.com/platform/user-behaviour-analytics (дата обращения 26.04.2023)
- Authentication platform // UnifyID. 2015. URL: https://unify.id (дата обращения 26.04.2023)
- SecuredTouch Company Profile ‒ Office Locations, Competitors, Financials, Employees, Key People, News // Craft.co. 2016. URL: https://craft.co/securedtouch (дата обращения 26.04.2023)