Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices

被引:13
|
作者
Salem, Asma
Zaidan, Dema
Swidan, Andraws
Saifan, Ramzi
机构
来源
2016 CYBERSECURITY AND CYBERFORENSICS CONFERENCE (CCC) | 2016年
关键词
Security; Authentication; access control; behavioral; Neural network;
D O I
10.1109/CCC.2016.11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
in this paper user verification and identification system on touch screen mobile devices is proposed. The system examines the keystroke dynamics and uses it as a second authentication factor. The study proposes a prototype for a keyboard application developed for collecting timing and non-timing information from keystroke dynamics. In addition to other mentioned in literature studies, we propose complex password combination, which consists of text, numbers, and special characters. Strengthening access control using artificial neural networking model is suggested. Neural network model based on multilayer perceptron classifier which uses back propagation algorithm is proposed. This paper presents a unique approach for combining timing and non-timing features together, as it includes several non-timing features such pressure, size, and position in addition to the duration time features. Several experiments have been done based on specific machine learning for data mining and classification toolkit named WEKA. The obtained results show that keystroke dynamics provides acceptable level of performance measures as a second authentication factor. The distinguishable role for non-timing features beside the timing features is demonstrated. These features have a significant role for improving the performance measures of keystroke dynamic behavioral authentication. The proposed model achieves lower error rate of false acceptance of 2.2%, false rejection of 8.67%, and equal error rate of 5.43% which are better than most of references provided in the literature.
引用
收藏
页码:15 / 21
页数:7
相关论文
共 41 条
  • [31] An Exploration of Keystroke Dynamics Authentication using Non-fixed Text of Various Length
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    Saeed, Khalid
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING (ICBAKE), 2013, : 245 - 250
  • [32] Efficient Remote User Authentication Technique for Internet Based Applications Using Keystroke Dynamics
    Neha
    Chatterjee, Kakali
    SMART TRENDS IN INFORMATION TECHNOLOGY AND COMPUTER COMMUNICATIONS, SMARTCOM 2016, 2016, 628 : 881 - 888
  • [33] Touch-Stroke Dynamics Authentication Using Temporal Regression Forest
    Ooi, Shih Yin
    Teoh, Andrew Beng-Jin
    IEEE SIGNAL PROCESSING LETTERS, 2019, 26 (07) : 1001 - 1005
  • [34] The impact of using different keyboards on free-text keystroke dynamics authentication for Arabic language
    Alsuhibany, Suliman A.
    Almushyti, Muna
    Alghasham, Noorah
    Alkhudhayr, Fatimah
    INFORMATION AND COMPUTER SECURITY, 2019, 27 (02) : 221 - 232
  • [35] Keystroke Biometric System for Touch Screen Text Input on Android Devices Optimization of Equal Error Rate based on Medians Vector Proximity
    Gautam, Prakash
    Dawadi, Pankaj Raj
    2017 11TH INTERNATIONAL CONFERENCE ON SOFTWARE, KNOWLEDGE, INFORMATION MANAGEMENT AND APPLICATIONS (SKIMA), 2017,
  • [36] Performance Analysis for a Touch Dynamic Authentication System with Reduced Feature Set Using Neural Networks
    SenthilPrabha, R.
    Vidhyapriya, R.
    RavithaRajalakshmi, N.
    IETE JOURNAL OF RESEARCH, 2016, 62 (02) : 198 - 204
  • [37] Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
    Kordy, Turki
    Noor, Fazal
    Benrhouma, Oussama
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (10): : 91 - 100
  • [38] User-centred multimodal authentication: securing handheld mobile devices using gaze and touch input
    Khamis, Mohamed
    Marky, Karola
    Bulling, Andreas
    Alt, Florian
    BEHAVIOUR & INFORMATION TECHNOLOGY, 2022, 41 (10) : 2047 - 2069
  • [39] Analysis of Free-text Keystroke Dynamics for Arabic Language Using Euclidean Distance
    Alsuhibany, Suliman A.
    Almushyti, Muna
    Alghasham, Noorah
    Alkhudier, Fatimah
    PROCEEDINGS OF THE 2016 12TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2016, : 185 - 190
  • [40] Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection
    Kim, Junhong
    Kim, Haedong
    Kang, Pilsung
    APPLIED SOFT COMPUTING, 2018, 62 : 1077 - 1087