Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm

Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm

Priya C. V., K. S. Angel Viji
Copyright: © 2021 |Pages: 20
DOI: 10.4018/IJISP.2021100106
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

In a password-based authentication technique, whenever the typed password and username matches the system database, the secure login page allows the client to access it. Despite the password matching, the proposed method checks the similarity between the typing rhythm of entered password and the rhythm of password samples in client's database. In this paper, a novel algorithmic procedure is presented to authenticate the legal client based on empirical threshold values obtained from the timing information of the client's keystroke dynamics. The exploratory outcomes demonstrate an impressive diminish in both false rejection rate and false acceptance rate. Equal error rate and authentication accuracy are also assessed to show the superiority and robustness of the method. Therefore, the proposed keystroke dynamics-based authentication method can be valuable in securing the system protection as a correlative or substitute form of client validation and as a useful resource for identifying the illegal invasion.
Article Preview
Top

Introduction

The extended application of computers in financial, mechanical, and individual exercises has made it more imperative to save, safeguard and store essential data (Hassan et al., 2018). Illicit rights to log on to the computers can bring a significant money related misfortune, so it is almost mandatory to build a high quality of security measures in these computer networks (Mihajlov et al., 2016). The most widely recognised approach to distinguishing legitimate clients is to specify a separate username and a secret personal identification number (PIN) or password for every customer. Meanwhile, anyone who inputs the right username and secret PIN of a legitimate client can be permitted to sign in to the secure networks. Sometimes the imposter can hack the legal client's secret password and also it is not hard to discover the other person's private password so that this framework is exceptionally defenceless. One way of fortifying the password based authentication technique is using biometrics.

Biometrics is an art of recognising people by a particular biological or behavioural trademark, for example, face, speech, finger print, eye iris, signature, voice and so on (Boopathi & Aramudhan, 2017; Dheeb et al., 2018; Geetha et al., 2018; Mohamad & Zarul, 2017; Mohanraj et al., 2018; Odei-Lartey et al., 2016; Raghuveera et al., 2017; Raihani et al., 2018; Ranjeet & Dilip, 2018; Regner et al., 2017; Sweetlin et al., 2018; Udaya & Ruchira, 2018; Van Zoonen & Turner, 2014). The singularity of a client biometric can lessen the risk of account theft, and there is no compelling reason for a user to remember or preserve the secret password. A biometric based authentication method requires extra equipment to snap the particular biological trademark that can make the security system even more costly.

Keystroke dynamics is a peculiar and typical case of biometrics that can be applied to check the person’s individuality (Leggett et al., 1991; Leggett & Williams, 1988). A special type of biometrics that utilises the typing rhythm of a character on the keyboard is called as keystroke dynamics. Distinctive sorts of information can be extricated from the person’s typing rhythm such as temperature and pressure of the client’s finger when they depress the keys and the timing information of keystroke (Kotani & Horii, 2005). Subsequently, the first two do not vary adequately between the persons, and they require some additional devices to capture the information, the timing data of keystroke dynamics are the most widely recognised feature extracted from the typing rhythm. Regardless of numerous other biometric validation frameworks, keystroke validation method does not require any extra equipment for client identification (except a typical console keypad needed to type the password). Typically a computer system used for any biometric based validation system has a built in keyboard. Additionally, it does not pose any trouble to the person, and it simply captures the typing rhythm of the password entered during the login session.

Complete Article List

Search this Journal:
Reset
Volume 18: 1 Issue (2024)
Volume 17: 1 Issue (2023)
Volume 16: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 15: 4 Issues (2021)
Volume 14: 4 Issues (2020)
Volume 13: 4 Issues (2019)
Volume 12: 4 Issues (2018)
Volume 11: 4 Issues (2017)
Volume 10: 4 Issues (2016)
Volume 9: 4 Issues (2015)
Volume 8: 4 Issues (2014)
Volume 7: 4 Issues (2013)
Volume 6: 4 Issues (2012)
Volume 5: 4 Issues (2011)
Volume 4: 4 Issues (2010)
Volume 3: 4 Issues (2009)
Volume 2: 4 Issues (2008)
Volume 1: 4 Issues (2007)
View Complete Journal Contents Listing