Keypress Interval Timing Ratios as Behavioral Biometrics for Authentication in Computer Security

被引:1
|
作者
Giroux, Shallen [1 ]
Wachowiak-Smolikova, Renata [1 ]
Wachowiak, Mark P. [1 ]
机构
[1] Nipissing Univ, Dept Math & Comp Sci, N Bay, ON, Canada
关键词
KEYSTROKE DYNAMICS;
D O I
10.1109/NDT.2009.5272133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many different types of keystroke dynamics approaches have been explored to protect personal data in networked systems. Keystroke patterns are behavioral biometrics, and are considered to be as unique to an individual as a signature. This paper presents a new approach to keystroke analysis that uses key press interval ratios to authenticate users. Participants in this study registered their passwords into a specially-designed analysis program. Keypress ratios were calculated, and neural network techniques were employed to obtain a mapping between patterns and the correct user. Results indicate that authentication through keypress ratios achieves high true acceptance rates, while also maintaining low false acceptance rates, which are particularly important in high-security applications. The approach presented here is suitable for incorporation into agent-based networked security systems.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 50 条
  • [41] Security protocols for biometrics-based cardholder authentication in smartcards
    Rila, L
    Mitchell, CJ
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2003, 2846 : 254 - 264
  • [42] Enhancing security of biometrics based authentication framework for DRM system
    Purva Rewal
    Dheerendra Mishra
    Ankita Mishra
    Saurab Rana
    [J]. Multimedia Tools and Applications, 2023, 82 : 40857 - 40871
  • [43] Enhancing security of biometrics based authentication framework for DRM system
    Rewal, Purva
    Mishra, Dheerendra
    Mishra, Ankita
    Rana, Saurab
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (26) : 40857 - 40871
  • [44] On the Security of Biometrics and Fuzzy Commitment Cryptosystems: A Study on Gait Authentication
    Van Hamme, Tim
    Rua, Enrique Argones
    Preuveneers, Davy
    Joosen, Wouter
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 16 : 5211 - 5224
  • [45] Improving the security of 'a flexible biometrics remote user authentication scheme'
    Khan, Muhammad Khurram
    Zhang, Jiashu
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 82 - 85
  • [46] Enhancing security and privacy in biometrics-based authentication systems
    Ratha, NK
    Connell, JH
    Bolle, RM
    [J]. IBM SYSTEMS JOURNAL, 2001, 40 (03) : 614 - 634
  • [47] Fusion of biometrics and blockchain - an integrated platform for aviation security and authentication
    Malek, Obaidul
    Ahmed, Munir
    Matin, Mohammad
    Islam, Zaherul
    [J]. DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VI, 2022, 12117
  • [48] Multi-Factor Biometrics for Authentication: A False Sense of Security
    Al-Assam, Hisham
    Sellahewa, Harin
    Jassim, Sabah
    [J]. MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, 2010, : 81 - 87
  • [49] The Behavioral Economics of Choice and Interval Timing
    Jozefowiez, J.
    Staddon, J. E. R.
    Cerutti, D. T.
    [J]. PSYCHOLOGICAL REVIEW, 2009, 116 (03) : 519 - 539
  • [50] Remote User Authentication Scheme A comparative analysis and improved behavioral biometrics based authentication scheme
    Kumar, Pramod
    Rauthan, Manmohan Singh
    [J]. 2016 INTERNATIONAL CONFERENCE ON MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING (ICMETE), 2016, : 311 - 313