iTnews
  • Home
  • News
  • Technology
  • Security

Keystroke dynamics block bots to boost security

By Stewart Mitchell on Nov 3, 2010 2:49PM
Keystroke dynamics block bots to boost security

Uses factors such as speed of typing.

Researchers have developed a software tool that records keystroke dynamics to create a fingerprint to identify who is using the computer, allowing it to distinguish human inputs from those of an automated software bot.

“The software uses things like the time between strokes, speed of typing, the most used keys and mouse actions to identify one user from another,” said Danfeng Yao, assistant professor of computer science at Virginia Tech.

“But the software can also tell the difference between human users and bots – even if they try to mirror human behaviour.”

The program is a response to a rise in automated malware attacks that use bots to create outgoing requests from a browser. According to Yao, the bots could be used to send out user passwords to control machines or attack external computers without the owner's knowledge.

“Almost all legitimate outbound traffic is started by human action, but with malicious sites or actions, there is no causal relationship between what the user does and the machine's action,” said Yao. "It is done by the bot."

“This software can spot this with a high degree of accuracy, even though your browser sends out a lot of information without specific user permission – maybe 20 requests for one click."

According to Yao, the prototype software offers good protection against drive-by malware downloads because it effectively quarantines the malware.

“You may still be infected with malware, but it isn't able to do anything useful,” she said.

A working version of the security tool has already been licenced by an unnamed company, which plans on building a separate firm around the technology.

“Right now, the program is an add-on that offers protection on its own, but you want your security built in to Windows and the network, and that's where we hope this will go, although it's not easy getting everyone to work together,” Yao said.

This article originally appeared at pcpro.co.uk

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © Alphr, Dennis Publishing
Tags:
blockboostbotsdynamicskeystrokesecurityto

Partner Content

Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Promoted Content Accenture and Google Cloud team up to create a loveable, Australian-first, renewable energy product
Why rethinking your CMS is crucial for customer retention
Promoted Content Why rethinking your CMS is crucial for customer retention
Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Stewart Mitchell
Nov 3 2010
2:49PM
0 Comments

Related Articles

  • Russia ratchets up internet control by blocking Tor
  • Twitter says zero-day bug leaked account data
  • Android apps are invasive and unsafe: study
  • Patches out for serious vulnerabilities in several VMware products
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Telstra deregisters 900MHz sites “hindering” Optus 5G rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Aussie Broadband nears end of NBN PoI fibre rollout

Defence, DEWR drop $160m on Microsoft software, Azure

Defence, DEWR drop $160m on Microsoft software, Azure

Transport for NSW exits Global Switch data centre

Transport for NSW exits Global Switch data centre

Digital Nation

COVER STORY: What happens when Google changes its algorithm?
COVER STORY: What happens when Google changes its algorithm?
Personalisation strategies need to be built from the ground up
Personalisation strategies need to be built from the ground up
Case Study: Swinburne University overhauls student management system
Case Study: Swinburne University overhauls student management system
COVER STORY: Multiple cloud models make security more complex
COVER STORY: Multiple cloud models make security more complex
Case Study: Multicloud business drivers at MLC Life Insurance
Case Study: Multicloud business drivers at MLC Life Insurance
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.