Password authentication using Keystroke Biometrics

The majority of applications use a prompt for a username and password. Passwords are recommended to be unique, long, complex, alphanumeric and non-repetitive. These reasons that make passwords secure may prove to be a point of weakness. The complexity of the password provides a challenge for a user and they may choose to record it. This compromises the security of the password and takes away its advantage. An alternate method of security is Keystroke Biometrics. This approach uses the natural typing pattern of a user for authentication. This paper proposes a new method for reducing error rates and creating a robust technique. The new method makes use of multiple sensors to obtain information about a user. An artificial neural network is used to model a user's behavior as well as for retraining the system. An alternate user verification mechanism is used in case a user is unable to match their typing pattern.

[1]  S. Henikoff,et al.  Amino acid substitution matrices from protein blocks. , 1992, Proceedings of the National Academy of Sciences of the United States of America.

[2]  Moshe Kam,et al.  Decision Fusion for Multimodal Active Authentication , 2013, IT Professional.

[3]  Andrew Beng Jin Teoh,et al.  Keystroke dynamics in password authentication enhancement , 2010, Expert Syst. Appl..

[4]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2005, IEEE Transactions on Signal Processing.

[5]  Abdulameer Khalaf Hussain,et al.  Selection of the Best threshold in Biometric Authentication by Exhaustive Statistical Pre-Testing , 2014 .

[6]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[7]  Kevin Warwick,et al.  User-Friendly Free-Text Keystroke Dynamics Authentication for Practical Applications , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.

[8]  Cheng-Jung Tsai,et al.  An approach for user authentication on non-keyboard devices using mouse click characteristics and statistical-based classification , 2012 .

[9]  Nasir Ahmad,et al.  Keystroke dynamics in the pre-touchscreen era , 2013, Front. Hum. Neurosci..

[10]  Issa Traoré,et al.  Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.

[11]  Osman Hegazy,et al.  Keystroke Authentication on Enhanced Needleman Alignment Algorithm , 2014 .

[12]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[13]  D. Polemi “BIOMETRIC TECHNIQUES: REVIEW AND EVALUATION OF BIOMETRIC TECHNIQUES FOR IDENTIFICATION AND AUTHENTICATION, INCLUDING AN APPRAISAL OF THE AREAS WHERE THEY ARE MOST APPLICABLE” , 2009 .

[14]  Ahmed E. Kamal,et al.  Capturing Cognitive Fingerprints from Keystroke Dynamics , 2013, IT Professional.

[15]  Christus,et al.  A General Method Applicable to the Search for Similarities in the Amino Acid Sequence of Two Proteins , 2022 .