Keystroke Dynamics Authentication Using Neural Network Approaches

Securing the sensitive data and computer systems by allowing ease access to authenticated users and withstanding the attacks of imposters is one of the major challenges in the field of computer security. Traditionally, ID and password schemes are most widely used for controlling the access to computer systems. But, this scheme has many flaws such as Password sharing, Shoulder surfing, Brute force attack, Dictionary attack, Guessing, Phishing and many more. Biometrics technologies provide more reliable and efficient means of authentication and verification. Keystroke Dynamics is one of the famous biometric technologies, which will try to identify the authenticity of a user when the user is working with a keyboard. In this paper, neural network approaches with three different passwords namely weak, medium and strong passwords are taken into consideration and accuracy obtained is compared.

[1]  Arun Ross,et al.  Score normalization in multimodal biometric systems , 2005, Pattern Recognit..

[2]  Sungzoon Cho,et al.  Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..

[3]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[4]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[5]  Sungzoon Cho,et al.  Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..

[6]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[7]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[8]  Marcus Brown,et al.  User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..

[9]  I. Traore,et al.  Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[10]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[11]  Hyoungjoo Lee,et al.  Retraining a keystroke dynamics-based authenticator with impostor patterns , 2007, Comput. Secur..

[12]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[13]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[14]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[15]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[16]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.