Passphrase Authentication Based on Typing Style Through an Art 2 Neural Network

This study proposes the use of an artificial neural network algorithm to perform passphrase authentication based on the typing style of a user. The only hardware required is a keyboard. Prior studies have demonstrated the feasibility of this approach and its limitations, one of which was the need for collection of impostor samples for training the artificial neural network based classifier algorithm. This requirement is rather impractical for most application domains. The proposed study eliminates the need to collect impostor samples by employing an unsupervised and self-organizing artificial neural network algorithm, the Adaptive Resonance Theory 2 neural network, and therefore pushes the passphrase authentication technology one step closer to the realm of practical implementation. The preliminary study performed demonstrates that it is possible to train an Adaptive Resonance Theory 2 neural network using only authentic sample data and still provide a relatively low impostor pass rate. Given the minimal cost and easy in-field trainability of the proposed passphrase authentication system, the developed system can greatly enhance the security of computing environments with wide acceptance.

[1]  Hyun-jung Kim Biometrics, is it a viable proposition for identity authentication and access control? , 1995, Comput. Secur..

[2]  Doug Mahar,et al.  Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions , 1995, Int. J. Hum. Comput. Stud..

[3]  Doug Mahar,et al.  Electronic monitoring systems: an examination of physiological activity and task performance within a simulated keystroke security and electronic performance monitoring system , 1998, Int. J. Hum. Comput. Stud..

[4]  Andy Whitefield,et al.  Skilled Typing: A Characterization Based on the Distribution of Times Between Responses , 1983 .

[5]  S. Grossberg,et al.  Neural dynamics of attentionally modulated Pavlovian conditioning: blocking, interstimulus interval, and secondary reinforcement. , 1987, Applied optics.

[6]  Jan H. P. Eloff,et al.  Enhanced Password Authentication through Fuzzy Logic , 1997, IEEE Expert.

[7]  David J. Ostry,et al.  Determinants of Interkey Times in Typing , 1983 .

[8]  Laurene V. Fausett,et al.  Fundamentals Of Neural Networks , 1993 .

[9]  Mohammad S. Obaidat,et al.  A verification methodology for computer systems users , 1995, SAC '95.

[10]  S. J. Shepherd Continuous authentication by analysis of keyboard typing characteristics , 1995 .

[11]  D. Gentner Keystroke Timing in Transcription Typing , 1983 .

[12]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[13]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[14]  Daw-Tung Lin Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[15]  John J. Leggett,et al.  Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..

[16]  Michael Wagner,et al.  Keyboard user verification: toward an accurate, efficient, and ecologically valid algorithm , 1995, Int. J. Hum. Comput. Stud..

[17]  Stephen Grossberg,et al.  Art 2: Self-Organization Of Stable Category Recognition Codes For Analog Input Patterns , 1988, Other Conferences.

[18]  Marcus Brown,et al.  User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..

[19]  Jacek M. Zurada,et al.  Introduction to artificial neural systems , 1992 .

[20]  R. Stockton Gaines,et al.  Authentication by Keystroke Timing , 1980 .

[21]  Teuvo Kohonen,et al.  Self-organization and associative memory: 3rd edition , 1989 .

[22]  Laurene V. Fausett,et al.  Fundamentals Of Neural Networks , 1994 .

[23]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[24]  O. Coltell,et al.  Biometric identification system based on keyboard filtering , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).

[25]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[26]  David M. Skapura,et al.  Building neural networks , 1995 .

[27]  Raymond J Staron,et al.  Personal Attributes Authentication Techniques. , 1977 .