User Authentication Based On Keystroke Dynamics
نویسندگان
چکیده
The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or not. The contribution of this approach is twofold: first it reduces the possibility of over fitting second it allows scalability to a high volume of users. Here, measured mean, median values, and standard deviation of keystroke features such as latency, dwell time, digraph and their combination are used. The algorithms used for feature subset selection are Particle Swarm Optimization (PSO), Genetic Algorithm (GA), Ant Colony Optimization (ACO) and the proposed Renovated Artificial Bee Colony Optimization (RABCO) algorithm. Back Propagation Neural Network (BPNN) is used for classification. Keywords— Keystroke Dynamics, Feature Extraction, Feature subset selection, Artificial Bee Colony Optimization, Back Propagation Neural Network.
منابع مشابه
Authentication on the Go: Assessing the Effect of Movement on Mobile Device Keystroke Dynamics
Transparent authentication based on behavioral biometrics has the potential to improve the usability of mobile authentication due to the lack of a possibly intrusive user interface. Keystroke dynamics, or typing behavior, is a potentially rich source of biometric information for those that type frequently, and thus has been studied widely as an authenticator on touch-based mobile devices. Howev...
متن کاملContinuous Authentication with Keystroke Dynamics
In this chapter we will discuss how keystroke dynamics can be used for true continuous authentication.We have collected keystroke dynamics data of 53 participants who used the computer freely and we have analysed the collected data. We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the ...
متن کاملBiometric Technologies for Online Student Authentication
In this work we present: i) an analysis of biometric technologies for online student authentication; ii) a case study on keystroke dynamics authentication applied to a real operational environment. Concisely, this work studies the biometric technologies and their advantages/disadvantages for online student authentication services. The analysis is made on the basis of three main pillars: perform...
متن کاملTOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to miti...
متن کاملA Survey of Biometric keystroke Dynamics: Approaches, Security and Challenges
Biometrics technologies are gaining popularity today since they provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the typing pattern of the user. A ...
متن کامل