Applying empirical thresholding algorithm for a keystroke dynamics based authentication system

Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. Furthermore, anyone who provides the correct username and password of a valid user will be a...

Full description

Saved in:
Bibliographic Details
Main Authors: Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2019
Subjects:
Online Access:http://repo.uum.edu.my/26843/1/JICT%2018%204%202019%20383-413.pdf
http://repo.uum.edu.my/26843/
http://jict.uum.edu.my/index.php/previous-issues/168-journal-of-information-and-communication-technology-jict-vol-18-no-4-october-2019
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uum.repo.26843
record_format eprints
spelling my.uum.repo.268432020-03-01T00:55:33Z http://repo.uum.edu.my/26843/ Applying empirical thresholding algorithm for a keystroke dynamics based authentication system Venugopal, Priya Chaliyath Viji, Kamalan Saroja Angel QA76 Computer software Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. Furthermore, anyone who provides the correct username and password of a valid user will be able to log in to the secure network. In current circumstances, impostors can hack the system to obtain a user’s password, while it has also been easy to find out a person’s private password. Thus, the existing structure is exceptionally flawed. One way to strengthen the password-based authentication technique, is by keystroke dynamics. In the proposed keystroke dynamics based authentication system, despite the password match, the similarity between the typing pattern of the typed password and password samples in the training database are verified. The timing features of the user’s keystroke dynamics are collected to calculate the threshold values. In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. The first step involves the extraction of timing features from the typed password samples. The password training database for each user is constructed using the extracted features. Moreover, the empirical threshold limits are calculated from the timing features in the database. The second step involves user authentication by applying these threshold values. The experimental analyses are carried out in MATLAB simulation, and the results indicate a significant reduction in false rejection rate and false acceptance rate. The proposed methodology yields very low equal error rate of 0.5% and the authentication accuracy of 99.5%, which are considered suitable and efficient for real-time implementation. The proposed method can be a useful resource for identifying illegal invasion and is valuable in securing the system as a correlative or substitute form of client validation. Universiti Utara Malaysia Press 2019 Article PeerReviewed application/pdf en http://repo.uum.edu.my/26843/1/JICT%2018%204%202019%20383-413.pdf Venugopal, Priya Chaliyath and Viji, Kamalan Saroja Angel (2019) Applying empirical thresholding algorithm for a keystroke dynamics based authentication system. Journal of Information and Communication Technology, 18 (4). pp. 383-413. ISSN 2180-3862 http://jict.uum.edu.my/index.php/previous-issues/168-journal-of-information-and-communication-technology-jict-vol-18-no-4-october-2019
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutional Repository
url_provider http://repo.uum.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Venugopal, Priya Chaliyath
Viji, Kamalan Saroja Angel
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
description Through the application of a password-based authentication technique, users are granted permission to access a secure system when the username and password matches with that logged in database of the system. Furthermore, anyone who provides the correct username and password of a valid user will be able to log in to the secure network. In current circumstances, impostors can hack the system to obtain a user’s password, while it has also been easy to find out a person’s private password. Thus, the existing structure is exceptionally flawed. One way to strengthen the password-based authentication technique, is by keystroke dynamics. In the proposed keystroke dynamics based authentication system, despite the password match, the similarity between the typing pattern of the typed password and password samples in the training database are verified. The timing features of the user’s keystroke dynamics are collected to calculate the threshold values. In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. The first step involves the extraction of timing features from the typed password samples. The password training database for each user is constructed using the extracted features. Moreover, the empirical threshold limits are calculated from the timing features in the database. The second step involves user authentication by applying these threshold values. The experimental analyses are carried out in MATLAB simulation, and the results indicate a significant reduction in false rejection rate and false acceptance rate. The proposed methodology yields very low equal error rate of 0.5% and the authentication accuracy of 99.5%, which are considered suitable and efficient for real-time implementation. The proposed method can be a useful resource for identifying illegal invasion and is valuable in securing the system as a correlative or substitute form of client validation.
format Article
author Venugopal, Priya Chaliyath
Viji, Kamalan Saroja Angel
author_facet Venugopal, Priya Chaliyath
Viji, Kamalan Saroja Angel
author_sort Venugopal, Priya Chaliyath
title Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
title_short Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
title_full Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
title_fullStr Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
title_full_unstemmed Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
title_sort applying empirical thresholding algorithm for a keystroke dynamics based authentication system
publisher Universiti Utara Malaysia Press
publishDate 2019
url http://repo.uum.edu.my/26843/1/JICT%2018%204%202019%20383-413.pdf
http://repo.uum.edu.my/26843/
http://jict.uum.edu.my/index.php/previous-issues/168-journal-of-information-and-communication-technology-jict-vol-18-no-4-october-2019
_version_ 1662757784471470080
score 13.149126