Bolstering user authentication

نویسندگان

چکیده

In most information systems today, static user authentication is accomplished when the provides a credential (for example, ID and matching password). However, passwords appear to be insecure method as they are vulnerable attacks chiefly caused by poor password hygiene. We contend that an additional, non-intrusive level of security can achieved analyzing keystroke biometrics coming up with unique biometric template user's typing pattern. The paper proposes new model for representing raw data collected biometrics. based on fuzzy sets kernel functions. corresponding algorithm developed. problem, our demonstrated relatively higher performance than some classic anomaly-detection algorithms, such Mahalanobis, Manhattan, nearest neighbor, outlier counting, neural network, support-vector machine.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

User authentication in SIP

Today Voice over Internet Protocol (VoIP) is used in large scale to deliver voice and multimedia over the packet data networks, such as the Internet. The Session Initiation Protocol (SIP) is widely used as a signalling protocol for VoIP. As SIP is being used more, the security of it is an important issue. In this paper, we concentrate on user authentication in SIP. We examine current solutions ...

متن کامل

User-aided data authentication

All classical authentication protocols are based on pre-shared authentic information such as long-term secret keys or a public key infrastructure. However, there are many practical settings, where participants can additionally employ authentic OutOf-Band (OOB) communication, e.g., manual message transfer. In this paper, we study the corresponding user-aided message authentication and key agreem...

متن کامل

Dynamic Remote User Authentication

The paper presents a dynamic remote user authentication scheme, wherein a registered user sends a dynamic message for every login session and it is verified by the remote system. The scheme is secure against the forgery, reply, guessing and insider attacks and provides a flexible password change option.

متن کامل

Sensor-Based User Authentication

We study the feasibility of leveraging the sensors embedded on mobile devices to enable a user authentication mechanism that is easy for users to perform, but hard for attackers to bypass. The proposed approach lies on the fact that users perform gestures in a unique way that depends on how they hold the phone, and on their hand’s geometry, size, and flexibility. Based on this observation, we i...

متن کامل

Remote User Authentication Scheme with User Anonymity

This paper proposes a scheme allowing a user to log into the server with a dynamic pseudonym. No one can trace the specified user except the service provider, which protects the user privacy from outsiders in this way. Besides, the scheme provides the following merits: (1) no verification table; (2) mutual authentication; (3) low communication and computation cost; (4) free password change; (5)...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of electrical and computer engineering systems

سال: 2022

ISSN: ['1847-6996', '1847-7003']

DOI: https://doi.org/10.32985/ijeces.13.4.6