mailto:uumlib@uum.edu.my 24x7 Service; AnyTime; AnyWhere

Applying empirical thresholding algorithm for a keystroke dynamics based authentication system

Venugopal, Priya Chaliyath and Viji, Kamalan Saroja Angel (2019) Applying empirical thresholding algorithm for a keystroke dynamics based authentication system. Journal of Information and Communication Technology, 18 (4). pp. 383-413. ISSN 2180-3862

[thumbnail of JICT 18 4 2019 383-413.pdf] PDF
Restricted to Registered users only

Download (834kB) | Request a copy

Abstract

Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. Furthermore, anyone who provides the correct username and password of a valid user will be able to log in to the secure network. In current circumstances, impostors can hack the system to obtain a user’s password, while it has also been easy to find out a person’s private password. Thus, the existing structure is exceptionally flawed. One way to strengthen the password-based authentication technique, is by keystroke dynamics. In the proposed keystroke dynamics based authentication system, despite the password match, the similarity between the typing pattern of the typed password and password samples in the training database are verified. The timing features of the user’s keystroke dynamics are collected to calculate the threshold values. In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. The first step involves the extraction of timing features from the typed password samples. The password training database for each user is constructed using the extracted features. Moreover, the empirical threshold limits are calculated from the timing features in the database. The second step involves user authentication by applying these threshold values. The experimental analyses are carried out in MATLAB simulation, and the results indicate a significant reduction in false rejection rate and false acceptance rate. The proposed methodology yields very low equal error rate of 0.5% and the authentication accuracy of 99.5%, which are considered suitable and efficient for real-time implementation. The proposed method can be a useful resource for identifying illegal invasion and is valuable in securing the system as a correlative or substitute form of client validation.

Item Type: Article
Uncontrolled Keywords: Authentication, computer security, empirical threshold, feature extraction, keystroke dynamics.
Subjects: Q Science > QA Mathematics > QA76 Computer software
Divisions: School of Computing
Depositing User: Mrs. Norazmilah Yaakub
Date Deposited: 01 Mar 2020 00:55
Last Modified: 01 Mar 2020 00:55
URI: https://repo.uum.edu.my/id/eprint/26843

Actions (login required)

View Item View Item