<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main"></title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vitalii</forename><surname>Fesokha</surname></persName>
							<email>vitaliifesokha@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="department">Kruty Heroes Military Institute of Telecommunications and Information Technologies</orgName>
								<orgName type="institution">Knyaziv Ostrozkyh</orgName>
								<address>
									<addrLine>st., 45/1</addrLine>
									<postCode>01011</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nadiia</forename><surname>Fesokha</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Ihor</forename><surname>Subach</surname></persName>
							<email>igor_subach@ukr.net</email>
							<affiliation key="aff0">
								<orgName type="department">Kruty Heroes Military Institute of Telecommunications and Information Technologies</orgName>
								<orgName type="institution">Knyaziv Ostrozkyh</orgName>
								<address>
									<addrLine>st., 45/1</addrLine>
									<postCode>01011</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>st. Verkhnoklyuchova, 4</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Artem</forename><surname>Mykytiuk</surname></persName>
							<affiliation key="aff0">
								<orgName type="department">Kruty Heroes Military Institute of Telecommunications and Information Technologies</orgName>
								<orgName type="institution">Knyaziv Ostrozkyh</orgName>
								<address>
									<addrLine>st., 45/1</addrLine>
									<postCode>01011</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>st. Verkhnoklyuchova, 4</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Ivan</forename><surname>Horniichuk</surname></persName>
							<email>horniychuk.ivan@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<addrLine>st. Verkhnoklyuchova, 4</addrLine>
									<postCode>03056</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff2">
								<orgName type="department">Information Technologies and Security</orgName>
								<address>
									<addrLine>November 30</addrLine>
									<postCode>2023</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">2D5096BB841C59FF8A06FA1EF592451B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T19:58+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Cyber security, unauthorized access, authentication, biometric model, keyboard handwriting, information systems, fuzzy logic, principal component method, data drift.1 0000-0001-6612-1970 (V. Fesokha)</term>
					<term>0000-0002-9797-5589 (N. Fesokha)</term>
					<term>0000-0002-9344-713X (I. Subach)</term>
					<term>0000-0002-8307-9978 (A. Mykytiuk)</term>
					<term>0000-0001-6754-4764 (I. Horniichuk)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the context of enhancing the protection of critical infrastructure information systems against unauthorized access, this work considers the user authentication procedure based on an improved keyboard handwriting biometric model grounded in fuzzy logic. A primary prerequisite for the development of the proposed biometric model is the need to expand the formalization of user uniqueness within information systems during the registration stage. The limited feature space of existing biometric models, which arises from the constraints of ordinary keyboard properties, negatively impacts the reliability of the authentication procedure. The construction of the biometric model relies on engineering behavioral patterns within a statistical dataset of keyboard handwriting, followed by the generation of new features and their description using fuzzy linguistic terms. During the configuration of the access control and user differentiation system in the information system, users are given the option to select the type of feature space for the keyboard handwriting biometric model: either a shared space for all users or a personalized one. Furthermore, it is planned to detect any drift in the values of the user's keyboard handwriting features based on Kullback-Leibler divergence to ensure timely adaptation of the biometric model to the dynamics of the user's behavior. A comparative analysis of the results from user authentication experiments based on the proposed approach and existing authentication methods is also presented.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>As of today, ensuring cybersecurity for critical infrastructure facilities, whose functions are directly tied to technological processes and/or services essential for national security, is a strategic priority for any nation.</p><p>Given that many cyber threat methods, including various types of cyberattacks-such as phishing, viruses, spyware, "man-in-the-middle" attacks, software vulnerabilities, and social engineering-share the objective of gaining unauthorized access to critical infrastructure information systems (IS), the task of ensuring data confidentiality, availability, and integrity is particularly crucial.</p><p>Access control and user differentiation systems are typically responsible for countering unauthorized access, especially during authentication, when the claimed identity of a user is verified for further authorization <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. However, current authentication methods often fall short in effectively safeguarding IS from cyber threats, as evidenced by numerous recent incidents of security breaches <ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref>. This is primarily due to attackers' evolving strategies, which necessitate new authentication methods and solutions for IS users.</p><p>An analysis of relevant literature <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref> reveals that one of the most effective ways to prevent unauthorized access to IS resources is through access control and user differentiation systems based on analyzing users' behavioral biometric characteristics at the authentication stage, as they are practically impossible to fake. This approach involves identifying users based on their subconscious sensory and motor skills throughout their interaction with the IS, allowing the detection of the substitution of an already authorized user.</p><p>In IS, the most common practice for analyzing behavioral biometric characteristics at the authentication stage is through keyboard handwriting (KH), assessing typing indicators such as speed, rhythm, pressure, press duration, and time between key presses during password entry or typing of arbitrary text <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3,</ref><ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref>.</p><p>This highlights the need for further research to improve user authentication effectiveness in critical infrastructure IS based on KH.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Biometric model of keyboard handwriting of users</head><p>In most scientific works <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref> focused on developing keyboard handwriting biometric models, the task of formalizing the uniqueness (individual subconscious characteristics) of users is constrained by a limited feature space in keyboard handwriting (typing speed, rhythm, key pressure, key press duration, and time between key presses). This limitation prevents these models from achieving adequate representation and, consequently, high accuracy in the authentication process. Therefore, this article examines a keyboard handwriting biometric model for users in critical infrastructure information systems, as proposed in <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>, which allows for expanding the keyboard handwriting feature space through feature engineering, using fuzzy logic to generate additional features.</p><p>The construction of this keyboard handwriting biometric model involves the following stages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">The synthesis of the initial keyboard handwriting feature space</head><p>The initial keyboard handwriting feature space, denoted as 𝑆 , whose features include (1): 𝑑 -typing dynamics -the time between key presses and the duration of key presses; 𝑡 -typing speed -the number of keystrokes divided by the typing duration.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>𝑆</head><p>= {𝑑, 𝑡 }.</p><p>(1)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Formation of new features</head><p>It is evident that the features selected in the previous stage do not sufficiently capture the uniqueness of information system (IS) users. Thus, following the approach proposed in <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>, new features are generated by defining behavioral patterns (templates) from a statistical dataset of keyboard handwriting during control text (password) input. Specifically, the duration of key presses by the user, denoted as ∆𝑡 , (where i is the key identifier), is considered. This indicator is chosen due to its minimal variability for each user compared to other indicators. For example, the duration between key presses reflects the time required for the user's hand to move across the keyboard, which inherently displays excessive variability.</p><p>Behavioral patterns are established through statistical analysis of the ∆𝑡 indicator by repeatedly entering the control text. This is then represented as a variation curve on a graph. Figure <ref type="figure" target="#fig_0">1</ref> presents the behavioral pattern function of the first author's keyboard handwriting, plotted at 12 points while entering their own 12-character password. This curve describes the rate of change (the geometric interpretation of differentiation), which can be approximated by trigonometric functions to engineer new features. In line with <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>, a subset of new keyboard handwriting features for the IS user is defined to create the final feature space for the keyboard handwriting biometric model 𝑀 . Consequently, the presented curve is segmented into equal-length time windows 𝑡 , which form a new subset of keyboard handwriting features 𝑆 (Fig. <ref type="figure">2</ref>).  To ensure minimal variability in the keyboard handwriting pattern values, the control text should be practiced thoroughly until it becomes automatic. Without this level of familiarity, the analysis of arbitrary text input loses its effectiveness for identifying a behavioral pattern in keyboard handwriting, which is difficult to falsify.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3.">Description of features using fuzzy linguistic terms</head><p>Since the values of a user's keyboard handwriting features exhibit some variability, the task of authenticating an IS user is essentially a process of iteratively assessing the degree of correspondence between their keyboard handwriting and the biometric model 𝑀 using fuzzy logic methods <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b14">15]</ref>. Here, the input linguistic variables are elements from the subsets. 𝑆 and 𝑆 . However, each time window 𝑡 contains a different number of segments (piecewise-linear functions) 𝑠𝑢𝑏 of the curve that describes the keyboard handwriting behavioral pattern. Consequently, the expanded feature space can be represented analytically <ref type="bibr" target="#b2">(3)</ref>. </p><p>To describe the features 𝑆 using fuzzy linguistic terms, we propose an approach that automatically determines the number of linguistic terms without requiring expert input, based on the statistical Silhouette method (4). This method calculates the optimal number of terms 𝑚𝑓 , … , 𝑚𝑓 , 𝑖 = 1, 𝑛 , where 𝑚𝑓 represents a triangular-shaped fuzzy linguistic term <ref type="bibr" target="#b15">[16]</ref>, and 𝑛 is the number of terms.</p><p>The optimal number of terms 𝑚𝑓 is selected to maximize the silhouette indicator (4):</p><formula xml:id="formula_1">𝑠(𝑖) = 𝑏(𝑖) − 𝑎(𝑖) 𝑚𝑎𝑥{𝑎(𝑖), 𝑏(𝑖)} ,<label>(4)</label></formula><p>where 𝑠(𝑖) -silhouette value of 𝑖 for term 𝑇; 𝑎(𝑖) -the average value of intra-term distance; 𝑏(𝑖) -distance between terms in features 𝑑, 𝑡 .</p><p>To describe the features 𝑆 using fuzzy linguistic terms, we calculate the angle for each segment of the curve obtained by determining the value in degrees between the horizontal axis and the segment, using the cosine theorem (5) <ref type="bibr" target="#b6">[7]</ref>.</p><formula xml:id="formula_2">cos 𝛼 = 𝑏 + 𝑐 − 𝑎 2𝑏𝑐 . (<label>5</label></formula><formula xml:id="formula_3">)</formula><p>After calculating the angle value, it is matched to the corresponding fuzzy term on a scale for fuzzy term determination (Fig. <ref type="figure" target="#fig_4">4</ref>), with increments of 15 degrees.  decreasing curve ↓ (very high, high, above average, medium, below average, low) -ranging from 90 ° to 180 °.</p><p>Figure <ref type="figure">5</ref> shows the final feature space of the proposed keyboard handwriting biometric model for information system users. To ensure effective model training, it is recommended that during the user registration phase, the user repeatedly enters the control text at least twice as many times as the number of features.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.4.">Selecting the type of feature space for the keyboard handwriting biometric model</head><p>In contrast to the approach proposed in <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>, which constructs a keyboard handwriting biometric model based on a common feature space for all users in the system, this work proposes allowing the cybersecurity administrator to select the type of feature space for the keyboard handwriting biometric model during the configuration of the user access control and segregation system in the information system (IS). The options include a common feature space for all users or a personalized feature space for individual users. Furthermore, the use of a common feature space introduces additional computational overhead. This is because, during the description of the time windows 𝑡 derived from the decomposition of the user's keyboard handwriting curve, it is necessary to formalize not only the varying number of upward and downward trends within each 𝑡 but also to maintain their precise sequence.</p><p>Additionally, when each system user is represented as a point in an nnn-dimensional common feature space, this space is often not linearly separable, as keyboard handwriting patterns of different individuals may intersect at certain points. This, in turn, can negatively impact model accuracy <ref type="bibr" target="#b6">[7]</ref>.</p><p>Therefore, it is recommended to construct the keyboard handwriting biometric model for critical infrastructure system users using a personalized feature space.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.5.">Detection of keyboard handwriting features drift</head><p>Over time, the effectiveness of the keyboard handwriting biometric model for IS users may decline, as typing speed tends to change with age or experience <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b16">17]</ref>. Thus, the task of detecting data driftthe change in statistical properties of data over time <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref> -becomes essential to allow timely retraining of models with updated datasets. This involves applying methods to identify when model updates are necessary.</p><p>In this stage, the difference or similarity between the distributions of the model's training dataset 𝑃(𝑥) (historical data) and the new (accumulated) dataset 𝑄(𝑥) is calculated using the Kullback-Leibler divergence <ref type="bibr" target="#b16">[17]</ref>. The Kullback-Leibler divergence (or relative entropy) measures the difference between two probability distributions, indicating how much the information entropy of one distribution differs from another. This asymmetric measure ranges from 0 to infinity, where 0 indicates identical distributions. The Kullback-Leibler divergence is calculated for distribution 𝑄 relative to P using the following analytical expression <ref type="bibr" target="#b5">(6)</ref>:</p><formula xml:id="formula_4">𝐾𝐿(𝑃 ∥ 𝑄) = 𝑃(𝑋)𝑙𝑜𝑔 𝑃(𝑥) 𝑄(𝑥) . (<label>6</label></formula><formula xml:id="formula_5">)</formula><p>It is advisable to periodically analyze the divergence values obtained between the training dataset and the accumulated statistics at least once every six months. This ensures the adaptation of the proposed keystroke biometric model to changes in the characteristics of information system (IS) users. If constant values of 𝐾𝐿(𝑃||𝑄) &gt; 0, are obtained, it is necessary to initiate the retraining of the keystroke biometric models for IS users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.6.">Authentication of critical infrastructure information system users based on the keyboard handwriting biometric model</head><p>During attempts to access information system (IS) resources, users present a personalized identifier, which is authenticated using a password.</p><p>The next step involves periodic additional authentication of the IS user 𝑢 ∈ 𝑈 throughout the entire session, based on the proposed approach to keyboard usage. The user recognition procedure for 𝑢 among all system users 𝑈 consists of evaluating the expression (7): 𝑢 = {𝑑, 𝑡 , 𝑡 = {𝑠𝑢𝑏 , . . , 𝑠𝑢𝑏 }, … , 𝑡 = {𝑠𝑢𝑏 , . . , 𝑠𝑢𝑏 }}.</p><p>With a specific periodicity or an event-based scheme configured by the administrator, the identified user 𝑢 ∈ 𝑈 may be blocked from accessing the IS, prompting them to enter a control text to verify the authenticity of their claimed personalized identifier. The event-based scheme responds to any keyboard or mouse activity if the user has been inactive for more than 5 minutes. If no actions are performed with the respective devices during this time, the user is not prompted for control text. However, if an event occurs after the specified interval, the user will be asked to enter the control text. The allowable variability in the specific keyboard characteristics of the user is monitored through ranges defined by linguistic terms within the keyboard handwriting biometric model.</p><p>If there is a mismatch between the characteristics of the claimed personalized identifier and the keyboard handwriting biometric model of user 𝑢 ∈ 𝑈, he current session will be terminated, and an appropriate message will be sent to the IS security system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Evaluation of effectiveness</head><p>To assess the effectiveness of authentication systems, metrics for first and second kind errors are employed: the False Rejection Rate (FRR)-the probability of incorrectly rejecting a registered userand the False Acceptance Rate (FAR)-the probability of granting access to an unregistered user <ref type="bibr" target="#b19">[20]</ref><ref type="bibr" target="#b20">[21]</ref><ref type="bibr" target="#b21">[22]</ref>. These metrics are calculated as follows:</p><formula xml:id="formula_7">𝐹𝑅𝑅 = 𝐹𝑁 𝐹𝑁 + 𝑇𝑃 ,<label>(8)</label></formula><formula xml:id="formula_8">𝐹𝐴𝑅 = 𝐹𝑃 𝐹𝑃 + 𝑇𝑁 ,<label>(9)</label></formula><p>where FN (False Negative) -the number of times a registered user has been denied access; TP (True Positive) -the number of times a registered user has been granted access; FP (False Positive) -the number of times an unregistered user was granted access; TN (True Negative) -the number of times an unregistered user was denied access.</p><p>The effectiveness of access control and segregation systems is greater when the values of 𝐹𝑅𝑅 and 𝐹𝐴𝑅 are minimized. Typically, one of these metrics is prioritized; specifically, prohibiting access to illegitimate users is considered more critical. To achieve this, it is essential to minimize the 𝐹𝐴𝑅. By reducing the False Acceptance Rate (𝐹𝐴𝑅), the system can effectively thwart unauthorized access attempts, prioritizing security measures that maintain the integrity and confidentiality of the information system. This focus on minimizing 𝐹𝐴𝑅 highlights the necessity of stringent authentication protocols to reduce the risk of unauthorized access and potential security breaches.</p><p>In commercial biometric authentication systems, the maximum acceptable value of 𝐹𝐴𝑅 typically ranges from 10 -3 to 10 -6 . In systems with a large user base and a high level of security, this value can drop to as low as 10 -9 . Meanwhile, the 𝐹𝑅𝑅 may vary between 0.025 and 0.01; for systems with many users, this rate should not exceed 0.001 to 0.0001. These thresholds provide benchmarks for evaluating the performance and reliability of biometric authentication systems, ensuring they meet stringent security requirements while balancing user convenience and system efficiency <ref type="bibr" target="#b22">[23,</ref><ref type="bibr" target="#b23">24]</ref>.</p><p>The analysis of the results demonstrates the practicality of the proposed solutions for user authentication in information systems. Specifically, the developed methodology enhances the reliability of information system authentication by reducing the FRR (type II error) by 2-3% compared to research results where the FAR (type I error) equals zero, and by 10-15% compared to research results where the FAR is greater than zero. This achievement aligns with the objectives of this work. A comparative analysis of the calculations based on the results of user authentication in information systems using the proposed approach versus existing methods <ref type="bibr" target="#b23">[24]</ref> is presented in Table <ref type="table" target="#tab_0">1</ref>, focusing on the FAR and FRR metrics. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion</head><p>In summary, the findings underscore the effectiveness of utilizing users' dynamic biometric traits for authentication, providing a robust safeguard for information security. Authentication decisions in these systems hinge on comparing the user's biometric model with data collected during the authentication process. The user's biometric model is developed through an analysis of specific individual characteristics, making systems that leverage keyboard handwriting recognition particularly valuable.</p><p>A biometric model of keyboard handwriting for users in critical infrastructure information systems has been proposed. This model expands the feature space of keyboard handwriting by analyzing behavioral patterns within a statistical dataset, generating new features, and describing them using fuzzy linguistic terms.</p><p>Additionally, the proposed model includes the detection of drift in users' keyboard handwriting characteristics using Kullback-Leibler divergence. This ensures timely adaptation of the biometric model to the dynamics of user behavior.</p><p>The practical application of the improved biometric model of keyboard handwriting patterns has demonstrated its effectiveness in recognizing users within access control and segregation systems in critical infrastructure facilities. This model enhances the reliability of user authentication in information systems by reducing the false rejection rate (FRR) by 2-3% compared to previous research results where the false acceptance rate (FAR) is zero, and by 10-15% compared to studies where the FAR exceeds zero.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: The graph of the keyboard handwriting behavioral pattern function of the first author while entering their own password</figDesc><graphic coords="3,123.36,71.76,347.76,261.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 : 2 )Figure 3</head><label>223</label><figDesc>Figure 2: The graphical representation of the decomposition of the investigated curve ∆𝑡 by the user 𝑢 into time windows 𝑡</figDesc><graphic coords="3,130.80,460.80,347.52,261.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The graphical representation of the result of entering control text, with a total of 5 attempts, is presented in the form of curves</figDesc><graphic coords="4,131.04,226.80,346.80,261.12" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head></head><label></label><figDesc>𝑀 = (𝑆∪ 𝑆 ) → {𝑑, 𝑡 , 𝑡 = {𝑠𝑢𝑏 , . . , 𝑠𝑢𝑏 }, … , 𝑡 = {𝑠𝑢𝑏 , . . , 𝑠𝑢𝑏 }}.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Scale for determining the fuzzy term of the linguistic variable</figDesc><graphic coords="5,121.32,397.20,352.44,198.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: The final feature space of the keyboard handwriting biometric model for information system users</figDesc><graphic coords="6,151.44,71.76,292.08,85.44" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1</head><label>1</label><figDesc>Results of IS user authentication based on the proposed approach and existing methods in terms of</figDesc><table><row><cell>FAR and FRR indicators</cell><cell></cell><cell></cell><cell></cell></row><row><cell>Researchers</cell><cell>Methods</cell><cell>FAR</cell><cell>FRR</cell></row><row><cell>European Access Control Standard</cell><cell>-</cell><cell>0,001%</cell><cell>1%</cell></row><row><cell>Bleha and Obaidat</cell><cell>perceptron</cell><cell>8%</cell><cell>9%</cell></row><row><cell>Nguyen, Le</cell><cell>neural network</cell><cell>4.12%</cell><cell>5.55%</cell></row><row><cell>Draffin, Zhu</cell><cell>neural network</cell><cell>14%</cell><cell>2.2%</cell></row><row><cell>Ahmed and Traore</cell><cell>neural network</cell><cell>0%</cell><cell>5.01%</cell></row><row><cell>Modi and Elliott</cell><cell>standard deviation</cell><cell>0.33%</cell><cell>94.87%</cell></row><row><cell>Trojahn, Arndt</cell><cell>mean square deviation</cell><cell>4.19%</cell><cell>4.59 %</cell></row><row><cell>Corpus, Gonzales</cell><cell>standard deviation</cell><cell>7%</cell><cell>40%</cell></row><row><cell>De Ru and Eloff</cell><cell>fuzzy logic</cell><cell>0-15%</cell><cell>-</cell></row><row><cell>Proposed solution</cell><cell>fuzzy logic, principal component analysis</cell><cell>0%</cell><cell>3.2%</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Analysis of existing authentication systems of information and communication systems and networks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Chunariova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Chunariov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Ukrainian Scientific Journal of Information Security</title>
		<imprint>
			<biblScope unit="issue">18</biblScope>
			<biblScope unit="page" from="65" to="70" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Fesokha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Fesokha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">О</forename><surname>Fesokha</surname></persName>
		</author>
		<title level="m">Analysis of existing solutions for authentication of users of information systems and special purpose networks</title>
				<editor>
			<persName><forename type="first">D</forename><surname>Dobroshtan</surname></persName>
		</editor>
		<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="129" to="136" />
		</imprint>
	</monogr>
	<note>Collection of scientific papers MITIT</note>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Model of fuzzy authentication of users of information systems of military administration based on behavioral biometrics // Protection of information</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Fesokha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">O</forename><surname>Fesokha</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2021">2021</date>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page" from="116" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<monogr>
		<ptr target="https://10guards.com/ua/articles/data-breaches-that-hit-the-headlines-in-2023" />
		<title level="m">Hacks that became top news</title>
				<imprint>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m">State scientific institution «Institute of information, security and law of the National academy of legal sciences of Ukraine</title>
				<editor>
			<persName><forename type="first">O</forename><surname>Dovgan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">O</forename><surname>Dovgan</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">L</forename><surname>Lytvynova</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">S</forename><surname>Dorogykh</surname></persName>
		</editor>
		<imprint/>
	</monogr>
	<note>Cyber security in the information society: Informational and analytical digest</note>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://www.immuniweb.com/blog/top-10-cloud-security-incidents-in-2022.html" />
		<title level="m">Top 10 Cloud Security Incidents in 2022</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">The method of regularization of the feature space of the biometric model of keyboard handwriting of users of military information systems based on factor analysis</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Fesokha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">O</forename><surname>Fesokha</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="page" from="152" to="162" />
			<pubPlace>Kyiv</pubPlace>
		</imprint>
	</monogr>
	<note>Collection of scientific papers MITIT</note>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Study of the effectiveness of biometric authentication methods</title>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">Y</forename><surname>Liashenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">А</forename><surname>Astrakhantsev</surname></persName>
		</author>
		<idno type="DOI">10.30748/soi.2017.148.20</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.30748/soi.2017.148.20" />
	</analytic>
	<monogr>
		<title level="j">Information</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">148</biblScope>
			<biblScope unit="page" from="111" to="114" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
	<note>processing systems</note>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Analysis of stability of the user&apos;s keyboard handwriting characteristics in the biometric authentication systems // Collection</title>
		<author>
			<persName><forename type="first">V</forename><surname>Yevetskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Horniichuk</surname></persName>
		</author>
		<idno type="DOI">10.20535/2411-1031.2018.6.2.153487</idno>
		<ptr target="https://doi.org/10.20535/2411-1031.2018.6.2.153487" />
	</analytic>
	<monogr>
		<title level="j">Information technology and security</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="19" to="28" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">Recurrent neural network-based user authentication for freely typed keystroke data</title>
		<author>
			<persName><forename type="first">J</forename><surname>Kim</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Kang</surname></persName>
		</author>
		<ptr target="https://arxiv.org/abs/1806.06190" />
		<imprint>
			<date type="published" when="2018-06">Jun 2018</date>
			<biblScope unit="volume">16</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Continuous authentication by free-text keystroke based on CNN and RNN</title>
		<author>
			<persName><surname>Lu</surname></persName>
		</author>
		<idno type="DOI">10.1016/j.cose.2020.101861</idno>
		<idno>DOI:</idno>
		<ptr target="https://doi.org/10.1016/j.cose.2020.101861" />
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">96</biblScope>
			<biblScope unit="page">101861</biblScope>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Password Authentication and Continuous Authentication by Keystroke Dynamics Using Mathematical Statistics</title>
		<author>
			<persName><forename type="first">D</forename><surname>Krutohvostov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Khitsenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Voprosy kiberbezopasnosti</title>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">User identification model based on keyboard handwriting</title>
		<author>
			<persName><forename type="first">L</forename><surname>Chalaia</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial intelligence</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="811" to="817" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<ptr target="http://www.iai.dn.ua/public/JournalAI_2004_4/Razdel8/06_Chalaya.pdf" />
		<title level="m">User identification model based on keyboard handwriting: website</title>
				<imprint/>
	</monogr>
	<note>Analysis of research and publications</note>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">System for recognizing keyboard handwriting of users based on a poly-Gaussian algorithm: article</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">E</forename><surname>Chalaya</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence: scientific-theoretical magazine</title>
		<imprint>
			<biblScope unit="issue">4</biblScope>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Zero-day polymorphic cyberattacks detection using fuzzy inference system</title>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Fesokha</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><forename type="middle">Y</forename><surname>Subach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">O</forename><surname>Kubrak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Mykytiuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">O</forename><surname>Korotaiev</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Austrian Journal of Technical and Natural Sciences</title>
		<imprint>
			<biblScope unit="page" from="8" to="13" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Determining the necessity of data drift of the biometric model of keyboard handwriting of users of military information systems based on the Kullback-Leibler distance</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">O</forename><surname>Fesokha</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">InterConf : Proceedings of the 2nd International Scientific and Practical Conference «Science and Education in Progress</title>
				<meeting><address><addrLine>Dublin</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2023-06-18">16-18 June 2023. 2023</date>
			<biblScope unit="page" from="353" to="354" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="https://medium.com(датазвернення:22.08.2022" />
		<title level="m">MLOps c Python-библиотекой Evidently: обнаружение дрейфа данных в ML-моделях</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Labelless concept drift detection and explanation</title>
		<author>
			<persName><forename type="first">Shihao</forename><surname>Zheng</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">NeurIPS 2019 Workshop on Robust AI in Financial Services: Data, Fairness, Explainability, Trustworthiness, and Privacy</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">Increasing the reliability of user authentication based on protected electronic key and behavioral biometrics</title>
		<author>
			<persName><forename type="first">O</forename><forename type="middle">V</forename><surname>Saliieva</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2023">2023</date>
			<biblScope unit="volume">167</biblScope>
			<biblScope unit="page" from="102" to="111" />
		</imprint>
	</monogr>
	<note>Visnyk of vinnytsia politechnical institute</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Biometric Security and Performance Metrics: FAR, FER, CER, FRR</title>
		<author>
			<persName><forename type="first">M</forename><surname>Sivaram</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ahamed</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Yuvaraj</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Megala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Porkodi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kandasamy</surname></persName>
		</author>
		<idno type="DOI">10.1109/iccike47802.2019.9004275</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of 2019 International Conference on Computational Intelligence and Knowledge Economy, ICCIKE</title>
				<meeting>2019 International Conference on Computational Intelligence and Knowledge Economy, ICCIKE<address><addrLine>Dubai, United Arab Emirates</addrLine></address></meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<author>
			<persName><forename type="first">D</forename><surname>Thakkar</surname></persName>
		</author>
		<ptr target="https://www.bayometric.com/false-acceptance-rate-far-false-recognition-rate-frr/" />
		<title level="m">False acceptance rate (FAR) and false recognition rate (FRR)</title>
				<imprint>
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Analysis of biometric user identification methods in controlled access systems. Bulletin of the National University of Water Management and Nature Management</title>
		<author>
			<persName><forename type="first">N</forename><surname>Shih</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Shakleina</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Technical Sciences</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="120" to="130" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Keyboard usage authentication using time series analysis. Big data analytics and knowledge discovery</title>
		<author>
			<persName><forename type="first">A</forename><surname>Alshehri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Coenen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Bollegala</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Cham</title>
		<imprint>
			<biblScope unit="page" from="239" to="252" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
