Keystroke Dynamics based Authentication using Fuzzy Logic

被引:0
作者
Yadav, Jatin [1 ]
Pandey, Kavita [1 ]
Gupta, Shashank [1 ]
Sharma, Richa [1 ]
机构
[1] Jaypee Inst Informat Technol, Noida, India
来源
2017 TENTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3) | 2017年
关键词
Fuzzy logic; Authentication system; Keystroke dynamics; USER IDENTIFICATION;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With online information thefts increasing every day, enhanced user authentication systems have become a necessity. This is due to the fact that current authentication systems have certain weaknesses, such as the username used for login is easily known to anyone and password can be guessed or forcibly retrieved. This paper focuses on overcoming these weaknesses by recognizing users based on their typing patterns. This technique which is used to uniquely label users based on their typing rhythm is known as keystroke dynamics. In an authentication system employing keystroke dynamics, samples provided by the users during the initial sign up phase are used to generate a template for the future authentication. This template is regularly updated whenever the user is correctly identified. The work proposed in this paper focuses on implementing a keystroke dynamics based authentication system using fuzzy logic. It also discusses how a fuzzy logic approach is beneficial as compared to other approaches implemented previously, and how a continuous learning model improves accuracy over time. The proposed fuzzy logic model gives 98% authentication accuracy and 2% false rejection rate.
引用
收藏
页码:313 / 318
页数:6
相关论文
共 16 条
[1]  
[Anonymous], 2012, INF SECUR TECH REP, DOI [DOI 10.1016/J.ISTR.2012.02.001, 10.1016/j.istr.2012.02.001]
[2]  
[Anonymous], MOB COMMUN POWER ENG
[3]  
[Anonymous], 2006, BIOMETRICS PERSONAL
[4]  
[Anonymous], 2013, 2013 INT C BIOSIG SP
[5]  
[Anonymous], 2007, P 2 ACM S INFORM COM
[6]  
Bours Patrick, 2009, NORW INF SEC C NISK, V2009
[7]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[8]   User authentication using keystroke dynamics for cellular phones [J].
Campisi, P. ;
Maiorana, E. ;
Lo Bosco, M. ;
Neri, A. .
IET SIGNAL PROCESSING, 2009, 3 (04) :333-341
[9]  
Giot R., IEEE 3 INT C BIOM TH, P1
[10]   Keystroke Dynamics Authentication For Collaborative Systems [J].
Giot, Romain ;
El-Abed, Mohamad ;
Rosenberger, Christophe .
PROCEEDINGS OF THE 2009 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, 2009, :172-179