dc.contributor.author | Gurčinas, Vitalijus | |
dc.contributor.author | Dautartas, Juozas | |
dc.contributor.author | Janulevičius, Justinas | |
dc.contributor.author | Goranin, Nikolaj | |
dc.contributor.author | Čenys, Antanas | |
dc.date.accessioned | 2023-09-18T16:39:33Z | |
dc.date.available | 2023-09-18T16:39:33Z | |
dc.date.issued | 2023 | |
dc.identifier.issn | 2079-9292 | |
dc.identifier.uri | https://etalpykla.vilniustech.lt/handle/123456789/115548 | |
dc.description.abstract | Investigation and detection of cybercrimes has been in the spotlight of cybersecurity research for as long as the topic has existed. Modern methods are required to keep up with the pace of the technology and toolset used to facilitate these crimes. Keystroke-injection attacks have been an issue due to the limitations of hardware and software up until recently. This paper presents comprehensive research on keystroke-injection payload generation that proposes the use of deep learning to bypass the security of keystroke-based authentication systems focusing on both fixed-text and free-text scenarios. In addition, it specifies the potential risks associated with keystroke-injection attacks. To ensure the legitimacy of the investigation, a model is proposed and implemented within this context. The results of the implemented implant model inside the keyboard indicate that deep learning can significantly improve the accuracy of keystroke dynamics recognition as well as help to generate effective payload from a locally collected dataset. The results demonstrate favorable accuracy rates, with reported performance of 93–96% for fixed-text scenarios and 75–92% for free-text. Accuracy across different text scenarios was achieved using a small dataset collected with the proposed implant model. This dataset enabled the generation of synthetic keystrokes directly within a low-computation-power device. This approach offers efficient and almost real-time keystroke replication. The results obtained show that the proposed model is sufficient not only to bypass the fixed-text keystroke dynamics system, but also to remotely control the victim’s device at the appropriate time. However, such a method poses high security risks when deploying adaptive keystroke injection with impersonated payload in real-world scenarios. | eng |
dc.format | PDF | |
dc.format.extent | p. 1-29 | |
dc.format.medium | tekstas / txt | |
dc.language.iso | eng | |
dc.relation.isreferencedby | Science Citation Index Expanded (Web of Science) | |
dc.relation.isreferencedby | Scopus | |
dc.relation.isreferencedby | DOAJ | |
dc.relation.isreferencedby | INSPEC | |
dc.rights | Laisvai prieinamas internete | |
dc.source.uri | https://www.mdpi.com/2079-9292/12/13/2894 | |
dc.source.uri | https://talpykla.elaba.lt/elaba-fedora/objects/elaba:170880559/datastreams/MAIN/content | |
dc.title | A deep-learning-based approach to keystroke-injection payload generation | |
dc.type | Straipsnis Web of Science DB / Article in Web of Science DB | |
dcterms.accessRights | This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/) | |
dcterms.license | Creative Commons – Attribution – 4.0 International | |
dcterms.references | 70 | |
dc.type.pubtype | S1 - Straipsnis Web of Science DB / Web of Science DB article | |
dc.contributor.institution | Vilniaus Gedimino technikos universitetas | |
dc.contributor.faculty | Fundamentinių mokslų fakultetas / Faculty of Fundamental Sciences | |
dc.subject.researchfield | T 007 - Informatikos inžinerija / Informatics engineering | |
dc.subject.researchfield | T 001 - Elektros ir elektronikos inžinerija / Electrical and electronic engineering | |
dc.subject.studydirection | B04 - Informatikos inžinerija / Informatics engineering | |
dc.subject.studydirection | E09 - Elektronikos inžinerija / Electronic engineering | |
dc.subject.vgtuprioritizedfields | IK0101 - Informacijos ir informacinių technologijų sauga / Information and Information Technologies Security | |
dc.subject.ltspecializations | L106 - Transportas, logistika ir informacinės ir ryšių technologijos (IRT) / Transport, logistic and information and communication technologies | |
dc.subject.en | keystroke dynamics | |
dc.subject.en | machine learning | |
dc.subject.en | deep learning | |
dc.subject.en | behavioral biometrics | |
dc.subject.en | keystroke recognition | |
dcterms.sourcetitle | Electronics: Special issue: Data driven security | |
dc.description.issue | iss. 13 | |
dc.description.volume | vol. 12 | |
dc.publisher.name | MDPI | |
dc.publisher.city | Basel | |
dc.identifier.doi | 001028585700001 | |
dc.identifier.doi | 10.3390/electronics12132894 | |
dc.identifier.elaba | 170880559 | |