Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices

被引:13
|
作者
Salem, Asma
Zaidan, Dema
Swidan, Andraws
Saifan, Ramzi
机构
关键词
Security; Authentication; access control; behavioral; Neural network;
D O I
10.1109/CCC.2016.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
in this paper user verification and identification system on touch screen mobile devices is proposed. The system examines the keystroke dynamics and uses it as a second authentication factor. The study proposes a prototype for a keyboard application developed for collecting timing and non-timing information from keystroke dynamics. In addition to other mentioned in literature studies, we propose complex password combination, which consists of text, numbers, and special characters. Strengthening access control using artificial neural networking model is suggested. Neural network model based on multilayer perceptron classifier which uses back propagation algorithm is proposed. This paper presents a unique approach for combining timing and non-timing features together, as it includes several non-timing features such pressure, size, and position in addition to the duration time features. Several experiments have been done based on specific machine learning for data mining and classification toolkit named WEKA. The obtained results show that keystroke dynamics provides acceptable level of performance measures as a second authentication factor. The distinguishable role for non-timing features beside the timing features is demonstrated. These features have a significant role for improving the performance measures of keystroke dynamic behavioral authentication. The proposed model achieves lower error rate of false acceptance of 2.2%, false rejection of 8.67%, and equal error rate of 5.43% which are better than most of references provided in the literature.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 50 条
  • [31] Continuous authentication by keystroke dynamics using committee machines
    de Lima e Silva Filho, Sergio Roberto
    Roisenberg, Mauro
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 686 - 687
  • [32] User Authentication Using Keystroke Dynamics via Crowdsourcing
    Foresi, Andrew
    Samavi, Reza
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 336 - 338
  • [33] Sensing Pressure for Authentication System Using Keystroke Dynamics
    Nonaka, Hidetoshi
    Kurihara, Masahito
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 1, 2007, 1 : 16 - 19
  • [34] KEYSTROKE DYNAMICS AUTHENTICATION USING A SMALL NUMBER OF SAMPLES
    Capek, Jan
    Hub, Miloslav
    E & M EKONOMIE A MANAGEMENT, 2020, 23 (04): : 215 - 226
  • [35] Keystroke Dynamics Authentication Using Neural Network Approaches
    Shanmugapriya, Venkateswaran
    Padmavathi, Ganapathi
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 686 - +
  • [36] COMPARATIVE ANALYSIS OF ONE TIME PASSWORD AUTHENTICATION ARCHITECTURES USING MOBILE DEVICES
    Stoica, Marian
    Trif, Silvia
    INTERNATIONAL CONFERENCE ON INFORMATICS IN ECONOMY, 2012, : 91 - 96
  • [37] Behavioral biometric authentication on smartphone using keystroke dynamics
    Vaishnav, Pragya
    Kaushik, Manju
    Raja, Linesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (02): : 591 - 600
  • [38] Keystroke Dynamics for Authentication Using Dynamic Time Warping
    Pramana, Made Indra Wira
    Suhardi
    Kurniawan, Novianto Budi
    Sembiring, Jaka
    PROCEEDINGS OF 2017 14TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2017,
  • [39] User authentication using keystroke dynamics for cellular phones
    Campisi, P.
    Maiorana, E.
    Lo Bosco, M.
    Neri, A.
    IET SIGNAL PROCESSING, 2009, 3 (04) : 333 - 341
  • [40] A novel approach for user authentication using keystroke dynamics
    Shekhawat, Kirty
    Bhatt, Devershi Pallavi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2015 - 2027