IMMUNOLOGICAL MODEL OF KEYBOARD MONITORING OF INFORMATION SYSTEM OPERATORS

  • Y.А. Bryuhomitsky Southern Federal University
Keywords: Chain method of keyboard monitoring of information system operators, immunological model of clonal selection with positive selection, verification of working operator by the principle of

Abstract

The purpose of this work is to develop a model of keyboard monitoring of information system operators,
based on the use of a chain method of accounting keyboard handwriting parameters. The specified
method provides estimation of operator's keyboard handwriting on chains of characters of given
length, reflecting linguistically related parameters of keyboard set, characteristic for the given operator.
The keyboard typing of such chains by the operator with "good" keyboard handwriting has significantly
higher individuality due to correlation dependences between the time parameters of successive characters
and pauses. As a result, the chain method allows to provide higher accuracy of operator's identity
verification. Keyboard monitoring based on the chain method is proposed to be implemented in the
basis of artificial immune systems using an immunological model of clonal selection, in which the detectors
are represented by identifying parameters of the distribution area of the keyboard parameters of
"friend". In the tasks of keyboard monitoring the area of distribution of keyboard parameters of the
verified operator is always significantly less than the cumulative area of distribution of keyboard parameters
of other possible operators. The choice of the specified model allows to significantly reduce the
required volume of the detector population, and as a consequence - to significantly reduce the verification
time of the working operator. The decision to replace "friend" operator with "stranger" is proposed
to be considered reasonable when the frequency of operation of detectors exceeds the established
threshold value. The proposed immunological model has a number of advantages. The use of the chain
method of keyboard parameters accounting allows to verify the operator with greater accuracy in comparison
with traditional methods. The clonal selection model in combination with vector representation
of the keyboard data allows to significantly speed up the learning process and reduce the time required
to make a timely decision on the presence of a "stranger" operator. An important advantage of the model
is the ability to learn solely from the examples of keyboard handwriting operationally available
"friend" operators. The use of the clonal selection model also makes it possible to significantly reduce
the required volume of the population of detectors capable of effectively "covering" the distribution area
of the keyboard parameters of "friend" operator

References

1. Bryukhomitskiy Yu.A. Klaviaturnaya identifikatsiya lichnosti [Keyboard identification of the
person]. Lambert Academic Publishing, Saarbrűcken, Germany, 2012, 140 p. ISBN 978-3-
8484-1119-1.
2. Fayskhanov I.F. Autentifikatsiya pol'zovateley pri pomoshchi ustoychivogo klaviaturnogo
pocherka so svobodnoy vyborkoy teksta [Authentication of users using a stable keyboard
handwriting with a free selection of text], Kibernetika i programmirovanie [Cybernetics and
programming], 2018, No. 3, pp. 72-86.
3. Yevetskiy V., Horniichuk I. Use of keyboard handwriting in user authentication systems, Information
Technology and Security, 2016, Vol. 4, Issue 1, pp. 27-33.
4. Vyazigin A.A., Tupikina N.Yu., Sypin E.V. Razrabotka i realizatsiya programmy dlya biometrii
pol'zovatelya personal'nogo komp'yutera na baze opredeleniya parametrov klaviaturnogo
pocherka [Development and implementation of a program for biometrics of a personal computer
user based on determining the parameters of the keyboard handwriting], Yuzhno-
Sibirskiy nauchnyy vestnik [South Siberian Scientific Bulletin], 2019, No. 1 (25), pp. 43-48.
5. Averin A.I., Sidorov D.P. Autentifikatsiya pol'zovateley po klaviaturnomu pocherku [User
authentication by keyboard handwriting], Ogarev-online [Ogarev-online], 2015, No. 20.
Available at: https://journal.mrsu.ru/arts/autentifikaciya-polzovatelej-po-klaviaturnomupocherku.
6. Joyce R., Gupta G. Identity Authentication Based on Keystroke Latencies. Available at:
http://www.cs.cmu.edu/~maxion/courses/JoyceGupta90.pdf.
7. Monrose F. Keystroke Dynamics as a Biometric for Authentication. Available at:
http://avirubin.com/fgcs.pdf.
8. Roth J., Liu X., Ross A. Biometric Authentication via Keystroke Sound. Available at:
http://www.cse.msu.edu/~liuxm/publication/Roth_Liu_Ross_Metaxas_ICB2013.pdf
9. Scott M. L. et al. Continuous Identity Verification through Keyboard Biometrics. Available at:
https://sa.rochester.edu/jur/issues/fall2005/ordal.pdf.
10. Bryukhomitskiy Yu.A. TSepochnyy metod klaviaturnogo monitoringa [Chain method of keyboard
monitoring], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences],
2009, No. 11, pp. 135-145.
11. Bryukhomitskiy Yu.A. Vydelenie informativnykh biometricheskikh parametrov v sistemakh
klaviaturnogo monitoringa [Identification of informative biometric parameters in keyboard
monitoring systems], Mater. XI Mezhdunarodnoy nauchno-prakticheskoy konferentsii
«Informatsionnaya bezopasnost'» [Proceedings of the XI International Scientific and Practical
Conference "Information Security"]. Part 2. Taganrog: Izd-vo TTI YuFU, 2010, pp. 67-72.
12. Bryukhomitskiy Yu.A., Kazarin M.N. Mnogosvyaznoe predstavlenie biometricheskikh
parametrov v sistemakh klaviaturnogo monitoringa [Multi-connected representation of biometric
parameters in keyboard monitoring systems], Mater. XI Mezhdunarodnoy nauchnoprakticheskoy
konferentsii «Informatsionnaya bezopasnost'» [Proceedings of the XI International
Scientific and Practical Conference "Information Security"]. Part 2. Taganrog: Izd-vo
TTI YuFU, 2010, pp. 72-77.
13. Bryukhomitskiy Yu.A. Immunologicheskiy podkhod k organizatsii klaviaturnogo monitoringa
[Immunological approach to the organization of keyboard monitoring], Izvestiya YuFU.
Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2014, No. 2 (151), pp. 33-41.
14. Bryukhomitskiy Yu.A. Klaviaturnyy monitoring na osnove immunologicheskogo klonirovaniya
[Keyboard monitoring based on immunological cloning], Bezopasnost' informatsionnykh
tekhnologiy [Security of Information Technologies], 2016, No. 4 (40), pp. 5-11.
15. Dasgupta D. Artificial Immune Systems and Their Applications. Springer-Verlag, 1998.
16. De Castro L N., Timmis J.I. Artificial Immune Systems: A New Computational Intelligence
Approach. London: Springer-Verlag, 2000, 357 p.
17. Hofmeyr S., Forrest S. Architecture for an Artificial Immune System, Evolutionary Computation,
2000,– 8 (4), pp. 443-473.
18. De Castro L.N., Von Zuben F.J. The Clonal Selection Algorithm with Engineering Applications,
submitted to GECCO’00, 2000, pp. 36-37.
19. Hofmeyr S., Forrest S. Architecture for an Artificial Immune System, Evolutionary Computation,
8 (4), pp. 443-473.
20. De Castro L.N., Von Zuben F.J. Learning and optimization using the clonal se-lection principle,
IEEE Transactions on Evolutionary Computation, Special Issue on Artificial Immune Systems,
2002, Vol. 6, No. 3, pp. 239-251.
21. De Castro L.N. and Timmis J.I. Artificial immune systems as a novel soft computing paradigm,
Soft Computing - A Fusion of Foundations, Methodologies and Applications, 2003,
7 (8), pp. 526-544.
22. Ji Z., Dasgupta D. Real-valued negative selection algorithm with variable-sized Detectors,
Proceedings of the Genetic and Evolutionary Computation, Seattle. Springer. Verlag: Seattle,
WA, USA, 2004, pp. 287-298.
23. Ji Z., Dasgupta D. Revisiting negative selection algorithm, Evolutionary Computation, 2007,
Vol. 15, No. 2 (Summer), pp. 223-251.
24. Iskusstvennye immunnye sistemy i ikh primenenie [Artificial immune systems and their application],
ed. by D. Dasgupty: trans. from Engl. A.A. Romanyukhi. Moscow: Fizmatlit, 2006, 344 p.
25. Dasgupta D., Yua S., Nino F. Recent advances in artificial immune systems: Models and applications,
Applied Soft Computing, 2011, Vol. 11, pp. 1574-1587.
26. Zaytsev S.A., Subbotin S.A. Modeli i metody avtomaticheskoy klassifikatsii ob"ektov po
priznakam na osnove immunokomp'yutinga [Models and methods of automatic classification
of objects by features based on immunocomputing], Radioelektronika, informatika, upravlenie
[Radioelectronics, informatics, management], 2010, No. 2, pp. 117-124.
Published
2023-06-07
Section
SECTION I. CONTROL SYSTEMS AND MODELING