Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices

被引:13
|
作者
Salem, Asma
Zaidan, Dema
Swidan, Andraws
Saifan, Ramzi
机构
来源
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC) | 2016年
关键词
Security; Authentication; access control; behavioral; Neural network;
D O I
10.1109/CCC.2016.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
in this paper user verification and identification system on touch screen mobile devices is proposed. The system examines the keystroke dynamics and uses it as a second authentication factor. The study proposes a prototype for a keyboard application developed for collecting timing and non-timing information from keystroke dynamics. In addition to other mentioned in literature studies, we propose complex password combination, which consists of text, numbers, and special characters. Strengthening access control using artificial neural networking model is suggested. Neural network model based on multilayer perceptron classifier which uses back propagation algorithm is proposed. This paper presents a unique approach for combining timing and non-timing features together, as it includes several non-timing features such pressure, size, and position in addition to the duration time features. Several experiments have been done based on specific machine learning for data mining and classification toolkit named WEKA. The obtained results show that keystroke dynamics provides acceptable level of performance measures as a second authentication factor. The distinguishable role for non-timing features beside the timing features is demonstrated. These features have a significant role for improving the performance measures of keystroke dynamic behavioral authentication. The proposed model achieves lower error rate of false acceptance of 2.2%, false rejection of 8.67%, and equal error rate of 5.43% which are better than most of references provided in the literature.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 41 条
  • [21] A Comparison of a Touch-Gesture- and a Keystroke-Based Password Method: Toward Shoulder-Surfing Resistant Mobile User Authentication
    Zhou, Lina
    Wang, Kanlun
    Lai, Jianwei
    Zhang, Dongsong
    IEEE TRANSACTIONS ON HUMAN-MACHINE SYSTEMS, 2023, 53 (02) : 303 - 314
  • [22] Improvised Classification Model for Cloud Based Authentication Using Keystroke Dynamics`
    Kumar, T. Senthil
    Suresh, Abhijit
    Karumathil, Aadarsh
    FRONTIER AND INNOVATION IN FUTURE COMPUTING AND COMMUNICATIONS, 2014, 301 : 885 - 893
  • [23] Improving authentication accuracy using artificial rhythms and cues for keystroke dynamics-based authentication
    Hwang, Seong-seob
    Lee, Hyoung-joo
    Cho, Sungzoon
    EXPERT SYSTEMS WITH APPLICATIONS, 2009, 36 (07) : 10649 - 10656
  • [24] Keystroke dynamics-based user authentication using long and free text strings from various input devices
    Kang, Pilsung
    Cho, Sungzoon
    INFORMATION SCIENCES, 2015, 308 : 72 - 93
  • [25] Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm
    Priya, C., V
    Viji, K. S. Angel
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2021, 15 (04) : 98 - 117
  • [26] A Visual One-Time Password Authentication Scheme Using Mobile Devices
    Chow, Yang-Wai
    Susilo, Willy
    Au, Man Ho
    Barmawi, Ari Moesriami
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2014, 2015, 8958 : 243 - 257
  • [27] User authentication by information source using fuzzy approach in biometric keystroke dynamics
    Hub, Miloslav
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, : 270 - +
  • [28] Design and Implementation of a RFID-based Authentication System by Using Keystroke Dynamics
    Tseng, Chun-wei
    Liu, Feng-jung
    Lin, Ting-yi
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [29] Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms
    Salem, Asma
    Sharieh, Ahmad
    Sleit, Azzam
    Jabri, Riad
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (08) : 4076 - 4092
  • [30] CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics
    Lin, Chenhao
    He, Jingyi
    Shen, Chao
    Li, Qi
    Wang, Qian
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (03) : 2314 - 2327