<?xml version="1.0" encoding="UTF-8"?>
<article article-type="research-article" dtd-version="1.3" xml:lang="ru" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="https://metafora.rcsi.science/xsd_files/journal3.xsd">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">moitvivt</journal-id>
      <journal-title-group>
        <journal-title xml:lang="ru">Моделирование, оптимизация и информационные технологии</journal-title>
        <trans-title-group xml:lang="en">
          <trans-title>Modeling, Optimization and Information Technology</trans-title>
        </trans-title-group>
      </journal-title-group>
      <issn pub-type="epub">2310-6018</issn>
      <publisher>
        <publisher-name>Издательство</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.26102/2310-6018/2024.45.2.021</article-id>
      <article-id pub-id-type="custom" custom-type="elpub">1596</article-id>
      <title-group>
        <article-title xml:lang="ru">Исследование поведенческой биометрии методами анализа данных и машинного обучения</article-title>
        <trans-title-group xml:lang="en">
          <trans-title>The study of behavioral biometrics using data analysis and machine learning methods</trans-title>
        </trans-title-group>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">0009-0000-2982-1441</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Смирнов</surname>
              <given-names>Илья Сергеевич</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Smirnov</surname>
              <given-names>Ilya Sergeevich</given-names>
            </name>
          </name-alternatives>
          <email>smiril13@mail.ru</email>
          <xref ref-type="aff">aff-1</xref>
        </contrib>
        <contrib contrib-type="author">
          <contrib-id contrib-id-type="orcid">0000-0002-3232-5331</contrib-id>
          <name-alternatives>
            <name name-style="eastern" xml:lang="ru">
              <surname>Кочкаров</surname>
              <given-names>Азрет Ахматович</given-names>
            </name>
            <name name-style="western" xml:lang="en">
              <surname>Kochkarov</surname>
              <given-names>Azret Akhmatovich</given-names>
            </name>
          </name-alternatives>
          <email>akochkarov@fa.ru</email>
          <xref ref-type="aff">aff-2</xref>
        </contrib>
      </contrib-group>
      <aff-alternatives id="aff-1">
        <aff xml:lang="ru">Финансовый университет при Правительстве РФ АО "АЛЬФА-БАНК"</aff>
        <aff xml:lang="en">Financial University under the Government of the Russian Federation AO "ALFA-BANK"</aff>
      </aff-alternatives>
      <aff-alternatives id="aff-2">
        <aff xml:lang="ru">Научно-исследовательский центр биотехнологии РАН Финансовый университет при Правительстве РФ</aff>
        <aff xml:lang="en">Scientific Research Center of Biotechnology of the Russian Academy of Sciences Financial University under the Government of the Russian Federation</aff>
      </aff-alternatives>
      <pub-date pub-type="epub">
        <day>01</day>
        <month>01</month>
        <year>2026</year>
      </pub-date>
      <volume>1</volume>
      <issue>1</issue>
      <elocation-id>10.26102/2310-6018/2024.45.2.021</elocation-id>
      <permissions>
        <copyright-statement>Copyright © Авторы, 2026</copyright-statement>
        <copyright-year>2026</copyright-year>
        <license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/">
          <license-p>This work is licensed under a Creative Commons Attribution 4.0 International License</license-p>
        </license>
      </permissions>
      <self-uri xlink:href="https://moitvivt.ru/ru/journal/article?id=1596"/>
      <abstract xml:lang="ru">
        <p>В статье показаны возможности применения методов машинного обучения для построения и анализа системы аутентификации на основе динамики нажатий клавиш. В работе обоснована необходимость улучшения многофакторной системы аутентификации. Предложен способ классификации работ поведенческой биометрии для сравнения и использования результатов исследований. Рассмотрены базовые возможности обработки и генерирования динамических и статических признаков динамики нажатий клавиш. Протестированы различные комбинации наборов признаков и выборок обучения, описана лучшая комбинация с равной частой ошибок (Equal Error Rate) 4,7%. Итеративный анализ качества системы позволяет установить важность первых символов последовательности ввода, а также нелинейную взаимосвязь степени ранжирования модели и EER. Высокие показатели, достигнутые бустинговой моделью, свидетельствуют о значительном потенциале поведенческой аутентификации для дальнейшего улучшения, развития и применения. Приводится значимость данного метода, его практическая полезность не только в задаче аутентификации, перспективы развития, включая использование нейросетевых методов и анализ динамики данных. Несмотря на достигнутые результаты, отмечается необходимость дальнейшей работы над моделью, включая разработку дополнительных моделей кластеризации, классификации, изменение набора признаков и построение каскада. Подчеркивается важность исследуемой области, способной принести значительный вклад в развитие информационной безопасности и технологий.</p>
      </abstract>
      <trans-abstract xml:lang="en">
        <p>The article shows the possibilities of using machine learning methods to build and analyze an authentication system based on the dynamics of keystrokes. The paper substantiates the need to improve the multifactor authentication system. A method of classifying the work of behavioral biometrics for comparison and use of research results is proposed. The basic possibilities of processing and generating dynamic and static signs of the dynamics of keystrokes are considered. Various combinations of feature sets and training samples were tested, and the best combination with an Equal Error Rate (EER) of 4.7% was described. An iterative analysis of the quality of the system allows us to establish the importance of the first characters of the input sequence, as well as the nonlinear relationship between the degree of ranking of the model and EER. The high performance achieved by the boosting model indicates the significant potential of behavioral authentication for further improvement, development and application. The significance of this method, its practical usefulness not only in the task of authentication, development prospects, including the use of neural network methods and data dynamics analysis are presented. Despite the achieved results, there is a need for further work on the model, including the development of additional clustering, classification models, changing the set of features and building a cascade. The importance of the research area, which can make a significant contribution to the development of information security and technology, is emphasized.</p>
      </trans-abstract>
      <kwd-group xml:lang="ru">
        <kwd>аутентификация</kwd>
        <kwd>поведенческая биометрия</kwd>
        <kwd>динамика нажатий клавиш</kwd>
        <kwd>классификация</kwd>
        <kwd>машинное обучение</kwd>
      </kwd-group>
      <kwd-group xml:lang="en">
        <kwd>authentication</kwd>
        <kwd>behavioral biometrics</kwd>
        <kwd>keystroke dynamics</kwd>
        <kwd>classification</kwd>
        <kwd>machine learning</kwd>
      </kwd-group>
      <funding-group>
        <funding-statement xml:lang="ru">Исследование выполнено без спонсорской поддержки.</funding-statement>
        <funding-statement xml:lang="en">The study was performed without external funding.</funding-statement>
      </funding-group>
    </article-meta>
  </front>
  <back>
    <ref-list>
      <title>References</title>
      <ref id="cit1">
        <label>1</label>
        <mixed-citation xml:lang="ru">Obaidat M.S. A verification methodology for computer systems users. In: SAC '95: 1995 Symposium on Applied Computing, 26-28 February 1995, Nashville, USA. New York: Association for Computing Machinery; 1995. P. 258–262. https://doi.org/10.1145/315891.315976</mixed-citation>
      </ref>
      <ref id="cit2">
        <label>2</label>
        <mixed-citation xml:lang="ru">Roshanbin N., Miller J. Enhancing CAPTCHA Security Using Interactivity, Dynamism, and Mouse Movement Patterns. International Journal of Systems and Service-Oriented Engineering. 2016;6(1):17–36. https://doi.org/10.4018/ijssoe.2016010102</mixed-citation>
      </ref>
      <ref id="cit3">
        <label>3</label>
        <mixed-citation xml:lang="ru">Chang L., Shi F., Taghizadeh-Hesary F., Saydaliev H.B. Information and communication technologies development and the resource curse. Resources Policy. 2023;80. https://doi.org/10.1016/j.resourpol.2022.103123</mixed-citation>
      </ref>
      <ref id="cit4">
        <label>4</label>
        <mixed-citation xml:lang="ru">Saini B.S., Kaur N., Bhatia K.S. Keystroke Dynamics for Mobile Phones: A Survey. Indian Journal of Science and Technology. 2016;9(6). https://doi.org/10.17485/ijst/2016/v9i6/82084</mixed-citation>
      </ref>
      <ref id="cit5">
        <label>5</label>
        <mixed-citation xml:lang="ru">Dhakal V., Feit A.M., Kristensson P.O., Oulasvirta A. Observations on Typing from 136 Million Keystrokes. In: CHI '18: CHI Conference on Human Factors in Computing Systems, 21-26 April 2018, Montreal, QC, Canada. New York: Association for Computing Machinery; 2018. https://doi.org/10.1145/3173574.3174220</mixed-citation>
      </ref>
      <ref id="cit6">
        <label>6</label>
        <mixed-citation xml:lang="ru">Lee H., Hwang J.Y., Kim D.I., Lee S., Lee S.-H., Shin J.S. Understanding Keystroke Dynamics for Smartphone Users Authentication and Keystroke Dynamics on Smartphones Built-In Motion Sensors. Security and Communication Networks. 2018;2018. https://doi.org/10.1155/2018/2567463</mixed-citation>
      </ref>
      <ref id="cit7">
        <label>7</label>
        <mixed-citation xml:lang="ru">Georgiev M., Eberz S., Martinovic I. Techniques for Continuous Touch-Based Authentication. In: ISPEC 2022: The 17th International Conference on Information Security Practice and Experience, 23-25 November 2022, Taipei, Taiwan. Cham: Springer; 2022. P. 409–431. https://doi.org/10.1007/978-3-031-21280-2_23</mixed-citation>
      </ref>
      <ref id="cit8">
        <label>8</label>
        <mixed-citation xml:lang="ru">Abernethy M., Rai S. Applying Feature Selection to Reduce Variability in Keystroke Dynamics Data for Authentication Systems. In: 13th Australian Information Warfare and Security Conference, 3-5 December 2012, Perth, Western Australia. Perth: SRI Security Research Institute, Edith Cowan University; 2012. P. 17–23. https://doi.org/10.4225/75/57a841bcbefaf</mixed-citation>
      </ref>
      <ref id="cit9">
        <label>9</label>
        <mixed-citation xml:lang="ru">Messerman A., Mustafić T., Camtepe S.A., Albayrak S. Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International Joint Conference on Biometrics (IJCB), 11-13 October 2011, Washington, DC, USA. IEEE; 2011. https://doi.org/10.1109/ijcb.2011.6117552</mixed-citation>
      </ref>
      <ref id="cit10">
        <label>10</label>
        <mixed-citation xml:lang="ru">Stragapede G. et al. IEEE BigData 2023 Keystroke Verification Challenge (KVC). In: 2023 IEEE International Conference on Big Data (BigData), 15-18 December 2023, Sorrento, Italy. IEEE; 2024. P. 6092–6100. https://doi.org/10.1109/BigData59044.2023.10386557</mixed-citation>
      </ref>
      <ref id="cit11">
        <label>11</label>
        <mixed-citation xml:lang="ru">Usman A.K., Shah M.H. Strengthening E-Banking security using Keystroke Dynamics. Journal of Internet Banking and Commerce. 2013;18(3). URL: https://www.icommercecentral.com/open-access/strengthening-ebanking-security-using-keystroke-dynamics.php?aid=38267</mixed-citation>
      </ref>
      <ref id="cit12">
        <label>12</label>
        <mixed-citation xml:lang="ru">Shah A., Shah P., Shah H., Bhadane C. Strengthening user Authentication using Keystroke Dynamics. International Journal of Engineering Research &amp; Technology. 2015;4(11).</mixed-citation>
      </ref>
      <ref id="cit13">
        <label>13</label>
        <mixed-citation xml:lang="ru">Stragapede G., Delgado-Santos P., Tolosana R., Vera-Rodriguez R., Guest R., Morales A. TypeFormer: Transformers for Mobile Keystroke Biometrics. URL: https://doi.org/10.48550/arXiv.2212.13075 (Accessed 10th April 2024).</mixed-citation>
      </ref>
      <ref id="cit14">
        <label>14</label>
        <mixed-citation xml:lang="ru">Özbek M.E. A flexible approach for biometric menagerie on user classification of keystroke data. Journal of Electrical Engineering. 2023;74(1). https://doi.org/10.2478/jee-2023-0003</mixed-citation>
      </ref>
      <ref id="cit15">
        <label>15</label>
        <mixed-citation xml:lang="ru">Teh P.S., Teoh A.B.J., Yue S. A Survey of Keystroke Dynamics Biometrics. The Scientific World Journal. 2013;2013. https://doi.org/10.1155/2013/408280</mixed-citation>
      </ref>
      <ref id="cit16">
        <label>16</label>
        <mixed-citation xml:lang="ru">Гузаиров М.Б., Исмагилова А.С., Лушников Н.Д. Аутентификация пользователей информационной системы по изображению лица. Моделирование, оптимизация и информационные технологии. 2023;11(4). https://doi.org/10.26102/2310-6018/2023.43.4.017</mixed-citation>
      </ref>
    </ref-list>
    <fn-group>
      <fn fn-type="conflict">
        <p>The authors declare that there are no conflicts of interest present.</p>
      </fn>
    </fn-group>
  </back>
</article>