基于LPVC和行為特征的身份認證技術(shù)研究與實現(xiàn)
[Abstract]:In recent years, the rapid development of the Internet has brought a variety of opportunities for social development, economic growth and cultural prosperity. Network security, especially identity authentication technology, has gradually become a problem that people pay attention to. Secure identity authentication is the basic premise to ensure the safe operation of computer network system. Because behavior features are unique and easy to collect, they have attracted much attention in the field of identity authentication, so it is very meaningful to study the identity authentication technology based on behavior characteristics. Aiming at the shortcomings of the user name / password scheme widely used in identity authentication of Web platform, a dynamic continuous identity authentication scheme based on static authentication and dynamic authentication is proposed in this paper. When users log on to the system initially, they need to obtain the system permission resources by the static authentication of user name / password and verification code. After the user acquires permission successfully, the dynamic authentication scheme based on the combination of keystroke behavior and mouse behavior features is adopted to continuously monitor the user's operation behavior. Through the operation behavior to judge whether the operation object is the user, it ensures the system login and the security after login. The main content of this paper is the application of image generation technology and operational behavior feature in dynamic continuous identity authentication system (DCA). In the static login, the multi-layer verification code image generation technology is adopted, which reduces the recognition accuracy of the computer for the verification code image. This paper develops a data acquisition software for DCA system to capture the user's operation behavior, and improves the calculation method of the operational trust score in the trust model to improve the accuracy of the calculation of the trust score. In order to prevent attackers from using security vulnerabilities to evade the intrusion detection of a certain device in the mouse or keyboard, the identity authentication is carried out by combining keystroke behavior characteristics with mouse behavior characteristics. Finally, a large number of experiments are carried out to verify the performance and behavior feature data processing and classification of dynamic continuous identity authentication system. The DCA system is tested by 53 volunteers under unconstrained conditions. The test results show that the accurate identification rate is 80%, and the dynamic continuous identity authentication can be realized well. The verification code images generated by traditional technology and multi-layer technology are recognized by computer respectively. It is found that the recognition error detection rate of the verification code image generated by multi-layer technology is obviously increased to 21. Effectively prevents a large number of malicious registrations of machine programs.
【學(xué)位授予單位】:江蘇科技大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2017
【分類號】:TP393.08
【參考文獻】
相關(guān)期刊論文 前10條
1 楊勇;許杰;;個人身份認證技術(shù)及其研究進展[J];通信技術(shù);2017年01期
2 盧世軍;;生物特征識別技術(shù)發(fā)展與應(yīng)用綜述[J];計算機安全;2013年01期
3 余幸杰;高能;江偉玉;;云計算中的身份認證技術(shù)研究[J];信息網(wǎng)絡(luò)安全;2012年08期
4 鄭雷雷;宋麗華;郭銳;張建成;;B/S架構(gòu)軟件的安全性測試研究[J];計算機技術(shù)與發(fā)展;2012年01期
5 夏亮;韓冬;馬書才;;基于神經(jīng)網(wǎng)絡(luò)的多因素身份認證方法[J];吉林大學(xué)學(xué)報(信息科學(xué)版);2011年02期
6 沈超;蔡忠閩;管曉宏;房超;杜友田;;基于鼠標(biāo)行為特征的用戶身份認證與監(jiān)控[J];通信學(xué)報;2010年07期
7 房超;蔡忠閩;沈超;牛非;管曉宏;;基于鼠標(biāo)動力學(xué)模型的用戶身份認證與監(jiān)控[J];西安交通大學(xué)學(xué)報;2008年10期
8 欒方軍;程海;宋曉宇;;基于HMM的在線手寫簽名認證系統(tǒng)設(shè)計與實現(xiàn)[J];計算機應(yīng)用與軟件;2008年06期
9 常亮;吳鐵峰;;基于自適應(yīng)模糊c均值的擊鍵序列身份認證[J];機械管理開發(fā);2008年02期
10 劉志才;彭宏;鄧爽;趙毓高;;基于支持向量方法和擊鍵序列的主機入侵檢測[J];計算機工程與應(yīng)用;2007年15期
相關(guān)碩士學(xué)位論文 前1條
1 郭曉靜;基于統(tǒng)計學(xué)的擊鍵序列身份認證算法研究與改進[D];北京郵電大學(xué);2013年
,本文編號:2399178
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2399178.html