A Neural Network Application for a Computer Access Security System: Keystroke Dynamics versus Voice Patterns

نویسنده

  • A. SERMET ANAGUN
چکیده

A neural network architecture is proposed to deal with a situation of multiple users where each user has his/her own password with different length. Two groups of experiments were conducted to find a better and a reliable way for a computer access security system. The neural networks are trained using time intervals between successive keystrokes during password entry through keyboard and voice patterns spoken via a microphone, respectively. The performance of the neural networks designed for each of the experiments is evaluated in terms of recognition accuracy. Two major issues, preventive security and detection of violations, which may be in question for a security system, are examined.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Neural Network Based Authentication and Verification for Web Based Key Stroke Dynamics

Web based authentication provide remote authentication and security control mechanism. Password typing is the most widely used identity verification method in World Wide Web based Electronic Commerce (EC). Due to its simplicity, it is vulnerable to imposter attacks. Keystroke dynamics and password checking can be combined to result in a more secure verification system. We proposed an associatio...

متن کامل

Neural Networks in Keystroke Dynamics for Multi-Factor Authentication in Biomedicine

This paper presents an improved authentication method for biomedicine based on behavioural biometrics. A brief definition of keystroke dynamics and neural networks is provided. The main part of the work focuses on evaluation of typing dynamics which is then proposed as an interesting behavioural biometric characteristic for use in computer security not being widely used so far. The result of th...

متن کامل

A machine learning approach to keystroke dynamics based user authentication

The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the ...

متن کامل

Keystroke dynamics identity verification - its problems and practical solutions

Password is the most widely used identity verification method in computer security domain. However, because of its simplicity, it is vulnerable to imposter attacks. Use of keystroke dynamics can result in a more secure verification system. Recently, Cho et al. (J Organ Comput Electron Commerce 10 (2000) 295) proposed autoassociative neural network approach, which used only the user’s typing pat...

متن کامل

10 Keystroke Dynamics Based Authentication

B. Sadoun Applied Science University Amman, Jordan [email protected] Abstract This chapter deals with the applications of keystroke dynamics to authenticate/verify access to computer systems and networks. It presents our novel contribution to this area along with other related works. The use of computer systems and networks has spread at a rate completely unexpected a decade ago. Computer systems...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007