Open Access Open Access  Restricted Access Subscription or Fee Access

User Identification Using Keystroke Dynamics

D. Shanmugapriya, Dr. G. Padmavathi

Abstract


Keyboard Entropy is a feature, which will try to identify the authenticity of a user when the user is working via a keyboard. The authentication process is done by observing the change in the entropy of the user. The objective of the paper is to design and implement a biometric authentication scheme by means of keyboard entropy to secure all applications, which require password authentication. Username and password pairs as authentication factors are as weak as they are ubiquitous. Use of a single factor of authentication is so weak that multi factor authentication methods are required. The tolerance factor provides a bit of leniency to check the authenticity of user. It is introduced in the master data depending upon how much deviation is caused by the user at different times. This paper proposes two formulae for calculating tolerance value which generates False Acceptance rate (FAR) and False Rejection Rate (FRR).

Keywords


Biometric, Entropy, False Acceptance Rate, False Rejection Rate.

Full Text:

PDF

References


A Guven, I Sogukpinar, “Understanding users' keystroke patterns for computer access security”, Computers and Security, Vol. 22, No. 8. (December 2003), pp. 695-706

Anil K. Jain, Arun Ross and Salil Prabhakar2, “An Introduction to Biometric Recognition”, IEEE Transactions on Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14, No. 1, January 2004.

Attila Meszaros, Zoltan Banko, Laszlo Czuni, “Strengthening Passwords by Keystroke Dynamics”, IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 6-8 September 2007

F. Bergadano, D. Gunetti, C. Picardi. “User Authentication through Keystroke Dynamics”, ACM Transactions on Information and System Security, Vol. 5, No. 4, November 2002, pp. 367–397.

Glaucya C. Boechat, Jeneffer C. Ferreira, and Edson C. B. Carvalho, Filho, “Using the Keystrokes Dynamic for Systems of Personal Security”, Proceedings Of World Academy Of Science, Engineering And Technology, Volume 18 December 2006 Issn 1307-6884

Gunetti and Picardi, “ Keystroke analysis of free text”, ACM Transactions on Information and System Security, volume 8, pages 312–347, 2005.

J.Mantyjarvi, J. Koivumaki, P. Vuori, “Keystroke Recognition for Virtual Keyboard” IEEE International Conference on Multimedia and Expo, Lausanne, Switzerland, Aug. 2002. pp. 429-432.

Joyce and Gupta, “Identity authentication based on keystroke latencies” Communications of the ACM, Volume 33, Issue 2, 168 - 176, 1990

Lane, David M., Napier, H. Albert, Batsell, Richard R. and Naman, John L. “Predicting the Skilled Use of Hierarchical Menus With the Keystroke-Level Model” In Human-Computer Interaction, 8 (2) pp. 185-192,1995

Lawrence O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication”, Proceedings of the IEEE, Vol. 91, No. 12, Dec. 2003, pp. 2019-2040

Matyas, V., Jr. Riha, Z., “Toward reliable user authentication through biometrics” IEEE security and privacy, Volume: 1, Issue: 3, May-June 2003, 45- 49.

Mohammad S. Obaidat, Balqies Sadoun: “Verification of computer users using keystroke dynamics”, IEEE Transactions on Systems, Man, and Cybernetics, Part B 27(2): 261-269 (1997)

Montrose, F. & Rubin, A.D. “Keystroke dynamics as a biometric for authentication.” Future Generation Computer Systems, 16(4), 351-359, (2000).

Revett, K. and Khan, A., “Enhancing login security using keystroke hardening and keyboard gridding”, Proceedings of the IADIS MCCSIS, 2005.

S. Bleha, C. Slivinsky, B. Hussien, “Computer-Access Security Systems using Keystroke Dynamics”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.12 Issue: 12 Dec 1990, pp.1217-1222.

S.M Matyas, J Stapleton. “A Biometric Standard for Information Management and Security”, Computers & Security Vol.19 Issue: 2. 2000.pp.428-441


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.