Continuous Authentication Based on Language Redundancy Analysis and Keystrokes Dynamics
نویسندگان
چکیده
In this paper, we have proposed a method by which we can continuously authenticate one claimant person through keystroke values of frequent letters in text. Language redundancy in human languages describe that all the letters are not evenly distribute in any text. Few letters in a text occurs most frequently and keystroke dynamics of those letters are taken into consideration as a measure for continuous authentication. A letter may distribute in many places in the text but more or less the keystroke timing of that letter is same. Comparison of a letter keystroke pattern values will authenticate user on regular basis. The proposed method was applied and evaluated on a sophisticated number of genuine users to prove that the authentication performance effective and satisfactory.
منابع مشابه
Spectral Analysis of Keystroke Streams: Towards Effective Real-Time Continuous User Authentication
Continuous authentication using keystroke dynamics is significant for applications where continuous monitoring of a user identity is desirable, for example in the context of the online assessments and examinations frequently encountered in eLearning environments. In this paper, a novel approach to realtime keystroke continuous authentication is proposed that is founded on a sinusoidal signals b...
متن کاملTowards Keystroke Continuous Authentication Using Time Series Analytics
An approach to Keystroke Continuous Authentication (KCA) is described founded on a time series analysis based approach that, unlike previous work on KCA (using feature vector representations) takes the sequencing of keystrokes into consideration. The significance of KCA is in the context of online assessments and examinations used in eLearning environments and MOOCs, which are becoming increasi...
متن کاملUtilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW
Keystroke Dynamics is one of the well-known and economical behavioral biometric developments that attempt to recognize the genuineness of a client when the client invokes his keystrokes from a computer keyboard. The keystrokes pattern helps to determine the typing behaviour of users of the system thus serves as the benchmark for identity verification. This paper displays the use of biometrics t...
متن کاملThe effects of segmentation and redundancy methods on cognitive load and vocabulary learning and comprehension of English lessons in a multimedia learning environment
The present study was conducted with the aim of the effects of segmentation and redundancy methods on cognitive load and vocabulary learning and comprehension of English lessons in a multimedia learning environment.The purpose of this study is an applied research and a real experimental study. The statistical population of the present study includes all people aged 14 to 16 who are enrolled in ...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کامل