Обзор методов идентификации пользователя на основе цифровых отпечатков

Обложка

Цитировать

Полный текст

Аннотация

Рассмотрены методы идентификации пользователей на основе цифровых отпечатков. Представлены основные подходы для формирования последних для браузера, который установлен на пользовательском устройстве и характеризует его принадлежность. Также описаны методы, применяемые для идентификации человека (пользователя) в процессе эксплуатации устройства. Представлены методы, использующие как динамику нажатий клавиш и взаимодействий с сенсорным экраном, голосовые и геолокационные данные, так и поведенческую биометрию и поведенческий профиль. В качестве развития подхода идентификации описана концепция непрерывной аутентификации. Приводится список общедоступных наборов данных, упоминаемых в рассмотренных в обзоре исследованиях, с указание ссылок для их скачивания. Приводится обширный список работ, отражающих современное состояние исследований в области цифровых отпечатков.

Об авторах

А. В. Осин

Московский технический университет связи и информатики

Email: a.v.osin@mtuci.ru
ORCID iD: 0000-0002-6384-9365
SPIN-код: 7775-2394

Ю. В. Мурашко

Московский технический университет связи и информатики

Email: u.v.murashko@edu.mtuci.ru
ORCID iD: 0009-0003-6448-8412

Список литературы

  1. Агафонов Ю.М. Деанонимизация пользователей на основе цифровых отпечатков браузера // XVI Всероссийская научно-практическая конференция студентов, аспирантов, молодых ученых «Безопасность информационного пространства – 2017» (Екатеринбург, Российская Федерация, 12 декабря 2017). Екатеринбург: Изд-во Урал. ун-та, 2018. С. 3−5.
  2. Алисултанова Э.Д., Исаева М.З., Болтиев Д.У. Анализ систем автономной идентификации пользователя сайта // Электронная наука. 2021. Т. 2. № 2. С. 7.
  3. Ишкуватов С.М., Комаров И.И. Анализ аутентичности трафика на основании данных цифровых отпечатков реализаций сетевых протоколов // Научно-технический вестник информационных технологий, механики и оптики. 2020. Т. 20. № 5. С. 747−754. doi: 10.17586/2226-1494-2020-20-5-747-754
  4. Балмаев И.Т. Идентификация пользователей сети Tor на основе параметров перехваченного трафика // Межвузовская научно-техническая конференция студентов, аспирантов и молодых специалистов им. Е.В. Арменского (Москва, Российская Федерация,17 февраля – 01 марта 2017). Москва: Московский институт электроники и математики НИУ ВШЭ, 2017. С. 372‒373.
  5. Шулицкий Д.С., Водейко А.Э. Методы защиты авторского права на программные продукты с помощью водяных знаков и отпечатков пальцев. 2019. URL: https://libeldoc.bsuir.by/bitstream/123456789/37230/1/Shulitskiy_Metody.pdf (дата обращения 20.10.2023)
  6. Гусев П.Д. Обзор существующих алгоритмов построения цифровых отпечатков // Безопасность информационных технологий. 2015. Т. 22. № 4. С. 63‒67.
  7. Борисова С.Н. Методы защиты аудиофайлов от несанкционированного копирования и распространения // Фундаментальные исследования. 2015. № 5-3. С. 481−487.
  8. Eckersley P. How Unique Is Your Web Browser? // Proceedings of the 10th International Symposium on Privacy Enhancing Technologies Symposium (PETS 2010, Berlin, Germany, 21−23 July 2010). Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 2010. Vol. 6205. PP. 1−18. doi: 10.1007/978-3-642-14527-8_1
  9. Mowery K., Shacham H. Pixel Perfect: Fingerprinting Canvas in HTML5 // Proceedings of W2SP. 2012. URL: https://api.semanticscholar.org/CorpusID:1399943 (Accessed 20.10.2023)
  10. Cao Y., Li S., Wijmans E. (Cross-) Browser Fingerprinting via OS and Hardware Level Features // NDSS’ 2017 (26 February − 1 March 2017, San Diego, USA). 2017. doi: 10.14722/ndss.2017.23152
  11. Englehardt S., Narayanan A. Online tracking: A 1-million-site Measurement and Analysis // Proceedings of the Conference on Computer and Communications Security (2016 ACM SIGSAC, Vienna, Austria, 24−28 October 2016). New York: Association for Computing Machinery, 2016. PP. 1388−1401. doi: 10.1145/2976749.2978313
  12. Sjösten A., Van Acker S., Sabelfeld A. Discovering Browser Extensions via Web Accessible Resources // Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy (CODASPY '17, Scottsdale, USA, 22−24 March 2017). New York: Association for Computing Machinery, 2017. PP. 329−336. doi: 10.1145/3029806.3029820
  13. Sanchez-Rola I., Santos I., Balzarotti D. Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies // Proceedings of the 26th USENIX Conference on Security Symposium (USENIX Security 17, Vancouver, Canada, 16−18 August 2017). Berkeley: USENIX Association, 2017. PP. 679−694.
  14. Starov O., Nikiforakis N. Xhound: Quantifying the Fingerprintability of Browser Extensions // Proceedings of the Symposium on Security and Privacy (SP, San Jose, USA, 22−26 May 2017). IEEE, 2017. PP. 941−956. doi: 10.1109/SP.2017.18
  15. Mowery K., Bogenreif D., Yilek S., Shacham H. Fingerprinting Information in JavaScript Implementations. 2012. URL: https://search.iczhiku.com/paper/hgdOSDNQ7g2K8zv8.pdf (Accessed 20.10.2023)
  16. Nakibly G., Shelef G., Yudilevich S. Hardware Fingerprinting Using HTML5 // arXiv:1503.01408. 2015. doi: 10.48550/arXiv.1503.01408
  17. Olejnik Ł., Acar G., Castelluccia C., Diaz C. The leaking battery // Proceedings of the International Workshop on Data Privacy Management International Workshop on Quantitative Aspects in Security Assurance. 2015. С. 254−263. doi: 10.1007/978-3-319-29883-2_18
  18. Vastel A., Laperdrix P., Rudametkin W., Rouvoy R. FP-STALKER: Tracking Browser Fingerprint Evolutions // Proceedings of the Symposium on Security and Privacy (SP, San Francisco, USA, 20−24 May 2018). IEEE, 2018. PP. 728−741. doi: 10.1109/SP.2018.00008
  19. Laperdrix P., Rudametkin W., Baudry B. Beauty and the Beast: Diverting Modern Web Browsers to Build Unique Browser Fingerprints // Proceedings of the Symposium on Security and Privacy (SP, San Jose, USA, 22−26 May 2016). IEEE, 2016. PP. 878−894. doi: 10.1109/SP.2016.57
  20. Gómez-Boix A., Laperdrix P., Baudry B. Hiding in the Crowd: an Analysis of the Effectiveness of Browser Fingerprinting at Large Scale // Proceedings of the World Wide Web Conference (Lyon, France, 23−27 April 2018). 2018. PP. 309−318. doi: 10.1145/3178876.3186097
  21. A look into several Angler Exploit Kit malvertising campaigns // Operation Fingerprint. 2016. URL: https://malwarebytes.app.box.com/v/operation-fingerprint (дата обращения 26.04.2023)
  22. ThreatMetrix − Cybersecurity Risk Management // LexisNexis Risk Solutions. URL: https://risk.lexisnexis.com/products/threatmetrix (дата обращения 26.04.2023)
  23. The Evolution of Hi-Def Fingerprinting in Bot Mitigation // Imperva. 2018. URL: https://www.imperva.com/blog/the-evolution-of-hi-def-fingerprinting-in-bot-mitigation (дата обращения 26.04.2023)
  24. Track Devices // MaxMind. 2023. URL: https://dev.maxmind.com/minfraud/track-devices (дата обращения 26.04.2023)
  25. Safeguard Websites, Mobile Apps & APIs From Bots // HUMAN Bot Defender. 2023. URL: https://www.humansecurity.com/products/human-bot-defender#scroll-down (дата обращения 26.04.2023)
  26. Device Fingerprint // IPQualityScore. 2023. URL: https://www.ipqualityscore.com/device-fingerprinting (дата обращения 26.04.2023)
  27. Comprehensive Bot Management // Radware. 2023. URL: https://www.radware.com/products/bot-manager (дата обращения 26.04.2023)
  28. Fraud Detection Software for Secure Growth // Sift. 2023. URL: https://sift.com/products/digital-trust-safety-platform (дата обращения 26.04.2023)
  29. Device Recognition // SecurAuth. 2023. URL: https://docs.secureauth.com/2104/en/device-recognition.html (дата обращения 26.04.2023)
  30. TruValidate // TransUnion. 2023. URL: https://www.transunion.com/solution/truvalidate (дата обращения 26.04.2023)
  31. Murashko Yu.V., Papaev B.N. Increasing the accuracy of user identification by digital fingerprint using a two-stage approach // X International Scientific and Practical Conference "Prospective scientific research: experience, problems and prospects of development". 2023. С. 191-195.
  32. Murashko Yu.V. Идентификация пользователей в сетевом трафике // Всероссийская научно-техническая конференция «Актуальные проблемы радиоэлектроники и телекоммуникаций» (Самара, Российская Федерация, 25–28 апреля 2023). 2023. С. 166–169.
  33. Sultana M., Paul P.P., Gavrilova M. A Concept of Social Behavioral Biometrics: Motivation, Current Developments, and Future Trends // Proceedings of the International Conference on Cyberworlds (Santander, Spain, 06−08 October 2014). IEEE, 2014. PP. 271−278. doi: 10.1109/CW.2014.44
  34. Мурашко Ю.В. Идентификация пользователей сети по их поведению // IX Всероссийская научно-техническая конференция «Фундаментальные и прикладные аспекты компьютерных технологий и информационной безопасности» (Таганрог, Российская Федерация, 10–15 апреля 2023). Ростов-на-Дону: Южный федеральный университет, 2023. С. 54−56.
  35. Rybnik M., Tabedzki M., Adamski M., Saeed K. An Exploration of Keystroke Dynamics Authentication Using Non-fixed Text of Various Length // Proceedings of the International Conference on Biometrics and Kansei Engineering (Tokyo, Japan, 05−07 July 2013). IEEE, 2013. PP. 245−250. doi: 10.1109/ICBAKE.2013.48
  36. Shimshon T., Moskovitch R., Rokach L., Elovici Y. Continuous Verification Using Keystroke Dynamics // Proceedings of the International Conference on Computational Intelligence and Security (Nanning, China, 11−14 December 2010). IEEE, 2010. PP. 411−415. doi: 10.1109/CIS.2010.95
  37. Teh P.S., Teoh A.B.J., Yue S. A Survey of Keystroke Dynamics Biometrics // The Scientific World Journal. 2013. Vol. 2013. P. 408280. doi: 10.1155/2013/408280
  38. Tsimperidis I., Yoo P.D., Taha K., Mylonas A., Katos V. R2BN: An adaptive Model for Keystroke-Dynamics-Based Educational Level Classification // IEEE Transactions on Cybernetics. 2018. Vol. 50. Iss. 2. PP. 525−535. doi: 10.1109/TCYB.2018.2869658
  39. Alshanketi F., Traore I., Ahmed A.A. Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication // Proceedings of the IEEE Security and Privacy Workshops (SPW, San Jose, USA, 22−26 May 2016). IEEE, 2016. С. 66−73. doi: 10.1109/SPW.2016.12
  40. Ali M.L., Thakur K., Tappert C.C., Qiu M. Keystroke Biometric User Verification Using Hidden Markov Model // Proceedings of the 3rd International Conference on Cyber Security and Cloud Computing (CSCloud, Beijing, China, 25−27 June 2016). IEEE, 2016. PP. 204−209. doi: 10.1109/CSCloud.2016.23
  41. Krishnamoorthy S., Rueda L., Saad S., Elmiligi H. Identification of User Behavioral Biometrics for Authentication Using Keystroke Dynamics and Machine Learning // Proceedings of the 2nd International Conference on Biometric Engineering and Applications (ICBEA '18, Amsterdam, Netherlands, 16−18 May 2018). New York: Association for Computing Machinery, 2018. PP. 50‒57. doi: 10.1145/3230820.3230829
  42. Higashino J. Signature Verification System on Neuro-Computer // Proceedings of the 11th International Conference on Pattern Recognition (IAPR, Hague, Netherlands, 30 August ‒ 3 September 1992). Vol. 3. 1992. PP. 517‒521.
  43. Everitt R.A.J., McOwan P.W. Java-based internet biometric authentication system // IEEE Transactions on Pattern Analysis and Machine Intelligence. 2003. Vol. 25. Iss. 9. PP. 1166‒1172. doi: 10.1109/TPAMI.2003.1227991
  44. Ahmed A.A.E., Traore I. A New Biometric Technology Based on Mouse Dynamics // IEEE Transactions on Dependable and Secure Computing. 2007. Vol. 4. Iss. 3. PP. 165‒179. doi: 10.1109/TDSC.2007.70207
  45. Antal M., Szabó L.Z. Biometric Authentication Based on Touchscreen Swipe Patterns // Procedia Technology. 2016. Vol. 22. PP. 862‒869. doi: 10.1016/j.protcy.2016.01.061
  46. Khan H., Hengartner U. Towards application-centric implicit authentication on smartphones // Proceedings of the 15th Workshop on Mobile Computing Systems and Applications (Santa Barbara, USA, 26‒27 February 2014). New York: Association for Computing Machinery, 2014. P. 10. PP. 1‒6. doi: 10.1145/2565585.2565590
  47. Ferrero R., Gandino F., Montrucchio B., Rebaudengo M., Velasco A., Benkhelifa I. On gait recognition with smartphone accelerometer // Proceedings of the 4th Mediterranean Conference on Embedded Computing (MECO, Budva, Montenegro, 14‒18 June 2015). IEEE, 2015. PP. 368‒373. doi: 10.1109/MECO.2015.7181946
  48. Fantana A.L., Ramachandran S., Schunck C.H., Talamo M. Movement based biometric authentication with smartphones // Proceedings of the International Carnahan Conference on Security Technology (ICCST, Taipei, Taiwan, 21‒24 September 2015). IEEE, 2015. PP. 235‒239. doi: 10.1109/CCST.2015.7389688
  49. Laghari A., Waheed-ur-Rehman, Memon Z.A. Biometric authentication technique using smartphone sensor // Proceedings of the 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST, Islamabad, Pakistan, 12‒16 January 2016). IEEE, 2016. PP. 381‒384. doi: 10.1109/IBCAST.2016.7429906
  50. Hong F., Wei M., You S., Feng Y., Guo Z. Waving authentication: your smartphone authenticate you on motion gesture // Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (Seoul, Republic of Korea, 18‒23 April 2015). New York: Association for Computing Machinery, 2015. PP. 263‒266. doi: 10.1145/2702613.2725444
  51. Ehatisham-ul-Haq M., Azam M.A., Naeem U., Amin Y., Loo J. Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing // Journal of Network and Computer Applications. 2018. Vol. 109. PP. 24‒35. doi: 10.1016/j.jnca.2018.02.020
  52. Feng T., Zhao X., Shi W. Investigating Mobile Device Picking-up motion as a novel biometric modality // Sixth International Conference on Biometrics on Theory, Applications and Systems (BTAS, Arlington, USA, 29 September ‒ 02 October 2013). IEEE, 2013. doi: 10.1109/BTAS.2013.6712701
  53. Oak R., Khare M. A Novel Architecture for Continuous Authentication Using Behavioural Biometrics // Proceedings of the International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC, Mysore, India, 8‒9 September 2017). 2017. PP. 767‒771. doi: 10.1109/CTCEEC.2017.8455040
  54. Reynolds D.A. An Overview of Automatic Speaker Recognition Technology // Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP, Orlando, USA, 13‒17 May 2002). IEEE, 2002. Vol. 4. PP. 4072‒4075.
  55. Ravanelli M., Bengio Y. Speaker Recognition from Raw Waveform with SincNet // Proceedings of the Spoken Language Technology Workshop (SLT, Athens, Greece, 18‒21 December 2018). IEEE, 2018. PP. 1021‒1028. doi: 10.1109/SLT.2018.8639585
  56. Arik S., Chen J., Peng K., Ping W., Zhou Y. Neural Voice Cloning with a Few Samples // Proceedings of the 32nd Conference on Neural Information Processing Systems (NeurIPS 2018, Montréal, Canada, 3‒8 December 2018). 2018. Vol. 31.
  57. Hu Q., Marchi E., Winarsky D., Stylianou Y., Naik D., Kajarekar S. Neural Text-to-Speech Adaptation from Low Quality Public Recordings // Proceedings of the 10th ISCA Workshop on Speech Synthesis (SSW 10, Vienna, Austria, 20‒22 September 2019). 2019. Vol. 10. PP. 24‒28. doi: 10.21437/SSW.2019-5
  58. Kameoka H. Stargan-vc: Non-parallel many-to-many voice conversion using star generative adversarial networks // Proceedings of the Spoken Language Technology Workshop (SLT, Athens, Greece, 18‒21 December 2018). IEEE, 2018. PP. 266−273. doi: 10.1109/SLT.2018.8639535
  59. Rebryk Y., Beliaev S. Convoice: Real-Time Zero-Shot Voice Style Transfer with Convolutional Network // arXiv:2005.07815. 2020. doi: 10.48550/arXiv.2005.07815
  60. Wu D.Y., Chen Y.H., Lee H.Y. Vqvc+: One-Shot Voice Conversion by Vector Quantization and U-Net Architecture // arXiv:2006.04154. 2020. doi: 10.48550/arXiv.2006.04154
  61. Wenger E., Bronckers M., Cianfarani C., Cryan J., Sha A., Zheng H., et al. "Hello, It's Me": Deep Learning-based Speech Synthesis Attacks in the Real World // Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security (Virtual Event Republic of Korea, 15−19 November 2021). New York: Association for Computing Machinery, 2021. PP. 235−251. doi: 10.1145/3460120.3484742
  62. Janicki A., Alegre F., Evans N. An assessment of automatic speaker verification vulnerabilities to replay spoofing attacks // Security and Communication Networks. 2016. Vol. 9. Iss. 15. PP. 3030−3044. doi: 10.1002/sec.1499
  63. Kinnunen T., Sahidullah M., Delgado H., Todisco M., Evans N. Yamagishi J., et al. The ASVspoof 2017 Challenge: Assessing the Limits of Replay Spoofing Attack Detection. 2017. URL: https://www.eurecom.fr/~evans/papers/pdfs/5235.pdf (дата обращения 22.10.2023)
  64. Gao Y., Lian J., Raj B., Singh R. Detection and Evaluation of Human and Machine Generated Speech in Spoofing Attacks on Automatic Speaker Verification Systems // Proceedings of the Spoken Language Technology Workshop (SLT, Shenzhen, China, 19−22 January 2021). IEEE, 2021. PP. 544−551. doi: 10.1109/SLT48900.2021.9383558
  65. Vestman V., Kinnunen T., Hautamäki R.G., Sahidullah Md. Voice Mimicry Attacks Assisted by Automatic Speaker Verification // Computer Speech & Language. 2020. Vol. 59. PP. 36−54. doi: 10.1016/j.csl.2019.05.005
  66. Masuko T., Hitotsumatsu T., Tokuda K., Kobayashi T. On the security of HMM-based speaker verification systems against imposture using synthetic speech // Proceedings of the Sixth European Conference on Speech Communication and Technology (EUROSPEECH 1999, Budapest, Hungary, 5-9 September 1999). 1999.
  67. Mukhopadhyay D., Shirvanian M., Saxena N. All Your Voices are Belong to Us: Stealing Voices to Fool Humans and Machines // Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015, Vienna, Austria, 21−25 September 2015). Lecture Notes in Computer Science. Cham: Springer, 2015. Vol. 9327. PP. 599−621. doi: 10.1007/978-3-319-24177-7_30
  68. Partila P., Tovarek J., Ilk G.H., Rozhon J., Voznak M. Deep Learning Serves Voice Cloning: How Vulnerable Are Automatic Speaker Verification Systems to Spoofing Trials? // IEEE Communications Magazine. 2020. Vol. 58. Iss. 2. PP. 100‒105. doi: 10.1109/MCOM.001.1900396
  69. Ahmed M.E., Kwak I.Y., Huh J.H., Kim I., Oh T., Kim H. Void: A fast and light voice liveness detection system // Proceedings of the 29th USENIX Security Symposium (USENIX Security, 12–14 August 2020). 2020. PP. 2685‒2702.
  70. AlBadawy E.A., Lyu S., Farid H. Detecting AI-Synthesized Speech Using Bispectral Analysis // Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) Workshops. 2019. PP. 104‒109.
  71. Huang C., Lin Y.Y., Lee H., Lee L. et al. Defending Your Voice: Adversarial Attack on Voice Conversion // Proceedings of the Spoken Language Technology Workshop (SLT, Shenzhen, China, 19−22 January 2021). IEEE, 2021. PP. 552‒559. doi: 10.1109/SLT48900.2021.9383529
  72. Kobayashi R., Yamaguchi R.S. A Behavior Authentication Method Using Wi-Fi BSSIDs around Smartphone Carried by a User // Proceedings of the Third International Symposium on Computing and Networking (CANDAR, Sapporo, Japan, 08‒11 December 2015). IEEE, 2015. PP. 463‒469. doi: 10.1109/CANDAR.2015.45
  73. Bassu D., Cochinwala M., Jain A. A new mobile biometric based upon usage context // Proceedings of the International Conference on Technologies for Homeland Security (HST, Waltham, USA, 12‒14 November 2013). IEEE, 2013. PP. 441‒446. doi: 10.1109/THS.2013.6699045
  74. Branscomb A.S. Behaviorally Identifying Smartphone Users. Master’s Thesis. Raleigh: North Carolina State University, 2013.
  75. Neal T.J., Woodard D.L., Striegel A.D. Mobile device application, Bluetooth, and Wi-Fi usage data as behavioral biometric traits // Proceedings of the 7th International Conference on Biometrics Theory, Applications and Systems (BTAS, Arlington, USA, 08‒11 September 2015). IEEE, 2015. PP. 1‒6. doi: 10.1109/BTAS.2015.7358777
  76. Fridman L., Weber S., Greenstadt R., Kam M. Active Authentication on Mobile Devices via Stylometry, Application Usage, Web Browsing, and GPS Location // IEEE Systems Journal. 2016. Vol. 11. Iss. 2. PP. 513‒521. doi: 10.1109/JSYST.2015.2472579
  77. Brocardo M.L., Traore I., Saad S., Woungang I. Authorship verification for short messages using stylometry // Proceedings of the International Conference on Computer, Information and Telecommunication Systems (CITS, Athens, Greece, 07‒08 May 2013. IEEE, 2013. PP. 1‒6. doi: 10.1109/CITS.2013.6705711
  78. Cao H., Bao T., Yang Q., Chen E. An effective approach for mining mobile user habits // Proceedings of the 19th ACM International Conference on Information and Knowledge Management (CIKM 2010, Toronto, Canada, 26‒30 October 2010). New York: Association for Computing Machinery, 2010. PP. 1677‒1680. doi: 10.1145/1871437.1871702
  79. Jang J., Yun J., Woo J., Kim H.K. Andro-profiler: anti-malware system based on behavior profiling of mobile malware // Proceedings of the 23rd International Conference on World Wide Web (WWW '14 Companion, Seoul, Korea, 7‒11 April 2014). New York: Association for Computing Machinery, 2014. PP. 737‒738. doi: 10.1145/2567948.2579366
  80. UMDAA-02 Dataset // Github. 2018. URL: https://umdaa02.github.io (дата обращения 26.04.2023)
  81. BiDAlab/HuMIdb // Github. 2020. URL: https://github.com/BiDAlab/HuMIdb (дата обращения 26.04.2023)
  82. BiDAlab/MobileB2C_BehavePassDB // Github. 2022. URL: https://github.com/BiDAlab/MobileB2C_BehavePassDB (дата обращения 26.04.2023)
  83. Mahbub U., Sarkar S., Patel V.M., Chellappa R. Active user authentication for smartphones: A challenge data set and benchmark results // Proceedings of the 8th international conference on biometrics theory, applications and systems (BTAS, Niagara Falls, USA, 06‒09 September 2016). IEEE, 2016. PP. 1‒8. doi: 10.1109/BTAS.2016.7791155
  84. Acien A., Morales A., Fierrez J., Vera-Rodriguez R., Delgado-Mohatar O. BeCAPTCHA: Behavioral bot detection using touchscreen and mobile sensors benchmarked on HuMIdb // Engineering Applications of Artificial Intelligence. 2021. Vol. 98. P. 104058. doi: 10.1016/j.engappai.2020.104058
  85. Stragapede G., Vera-Rodriguez R., Tolosana R., Morales A. BehavePassDB: Public Database for Mobile Behavioral Biometrics and Benchmark Evaluation // Pattern Recognition. 2023. Vol. 134. P. 109089. doi: 10.1016/j.patcog.2022.109089
  86. Ananya S.S. Keystroke Dynamics for Continuous Authentication // Proceedings of the 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence, Noida, 11‒12 January 2018). IEEE, 2018. PP. 205‒208. doi: 10.1109/CONFLUENCE.2018.8442703
  87. Mondal S., Bours P. Continuous authentication using mouse dynamics // Proceedings of the International Conference of the BIOSIG Special Interest Group (BIOSIG, Darmstadt, Germany, 05‒06 September 2013). IEEE, 2013. PP. 1‒12.
  88. Plurilock AI ‒ Least privilege CASB, DLP with DEFEND technology // Plurilock. 2016. URL: https://plurilock.com (дата обращения 26.04.2023)
  89. ThreatMark Fraud Prevention Solution // ThreatMark. 2015. URL: https://www.threatmark.com (дата обращения 26.04.2023)
  90. VoiSentry // Aculab. 2018. URL: https://www.aculab.com/biometric-technologies/voisentry (дата обращения 26.04.2023)
  91. User Behavior Analytics (UBA) // Cynet. 2018. URL: https://www.cynet.com/platform/user-behaviour-analytics (дата обращения 26.04.2023)
  92. Authentication platform // UnifyID. 2015. URL: https://unify.id (дата обращения 26.04.2023)
  93. SecuredTouch Company Profile ‒ Office Locations, Competitors, Financials, Employees, Key People, News // Craft.co. 2016. URL: https://craft.co/securedtouch (дата обращения 26.04.2023)


Creative Commons License
Эта статья доступна по лицензии Creative Commons Attribution 4.0 International License.

Данный сайт использует cookie-файлы

Продолжая использовать наш сайт, вы даете согласие на обработку файлов cookie, которые обеспечивают правильную работу сайта.

О куки-файлах