Impact of Network and Host Characteristics on the Keystroke Pattern in Remote Desktop Sessions

12/07/2020
by   Ievgeniia Kuzminykh, et al.
0

Authentication based on keystroke dynamics is a convenient biometric approach, easy in use, transparent, and cheap as it does not require a dedicated sensor. Keystroke authentication, as part of multi factor authentication, can be used in remote display access to guarantee the security of use of remote connectivity systems during the access control phase or throughout the session. This paper investigates how network conditions and additional host interaction may impact the behavioural pattern of keystrokes when used in a remote desktop application scenario. We focus on the timing of adjacent keys and investigate this impact by calculating the variations of the Euclidean distance between a reference profile and resulting profiles following such impairments. The experimental results indicate that variations of congestion latency, whether produced by adjacent traffic sources or by additional remote desktop interactions, have a substantive impact on the Euclidian distance, which in turn may affect the effectiveness of the biometric authentication algorithm. Results also indicate that data flows within remote desktop protocol are not prioritized and therefore additional traffic will have a significant impact on the keystroke timings, which renders continuous authentication less effective for remote access and more appropriate for one-time login.

READ FULL TEXT

page 1

page 3

page 4

page 8

page 9

page 10

research
04/09/2019

Secure Biometric-based Remote Authentication Protocol using Chebyshev Polynomials and Fuzzy Extractor

In this paper, we have proposed a multi factor biometric-based remote au...
research
03/02/2022

Video is All You Need: Attacking PPG-based Biometric Authentication

Unobservable physiological signals enhance biometric authentication syst...
research
09/06/2021

A Novel Multimodal Biometric Authentication System using Machine Learning and Blockchain

Traditional authentication systems that rely on simple passwords, PIN nu...
research
03/18/2019

The epidemiology of lateral movement: exposures and countermeasures with network contagion models

An approach is developed for analyzing computer networks to identify sys...
research
08/26/2019

Integration of the Captive Portal paradigm with the 802.1X architecture

In a scenario where hotspot wireless networks are increasingly being use...
research
03/31/2023

AI-Oriented Two-Phase Multi-Factor Authentication in SAGINs: Prospects and Challenges

Space-air-ground integrated networks (SAGINs), which have emerged as an ...
research
10/12/2021

Evaluation of computer networking methods for interaction with remote robotic systems

Use of robotic infrastructures can significantly increase with remote ac...

Please sign up or login with your details

Forgot password? Click here to reset