![]() One of the ways to mitigate this problem is by using intrusion detection systems that act on the workstation ( host-based). Consequently, an intruder could use the computer masquerading as the legitimate user, resulting in identity theft. Nevertheless, even more secure authentication methods do not provide an entirely effective security mechanism, as the computer may be vulnerable to intruders when the user leaves the workstation and does not end the session. In the case of workstations, for example, the authentication usually occurs in the system initialization, known as initial authentication. ![]() Authentication is the process used to confirm the identity of a user. In view of this scenario, more sophisticated methods for user authentication have been developed. The term identity theft is commonly used to refer to the crime of using personal information of someone else to illegally pretend to be a certain person. As a result, identity theft has gained new momentum. online banking, e-commerce, e-mail), security problems became more evident. Recently, in view of the increased dissemination of the internet in several activities (e.g. The wider dissemination of digital identities has contributed to greater worries regarding information exposure. We summarized main classifiers, performance measures, extracted features and benchmark datasets used in the area. This paper discusses the process involved in the review along with the results obtained in order to identify the state of the art of keystroke dynamics. Systematic reviews are not commonly used in artificial intelligence, and this work contributes to its use in the area. The systematic review method adopts a rigorous procedure with the definition of a formal review protocol. In order to guide future researches in this area, a systematic review on keystroke dynamics was conducted and presented here. Among the possible technologies to be analysed, this work focuses on keystroke dynamics, which attempts to recognize users by their typing rhythm. A possible way to overcome this issue is by the use of biometric technologies for user authentication. Computing and communication systems have improved our way of life, but have also contributed to an increased data exposure and, consequently, to identity theft.
0 Comments
Leave a Reply. |