Tuesday, July 3, 2018

INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNAMICS TIMERS

INVESTIGATING & IMPROVING THE RELIABILITY AND REPEATABILITY OF KEYSTROKE DYNAMICS TIMERS
Mr Pavaday Narainsamy 1, Dr Soyjaudah Sunjiv2 & Mr Nugessur Shrikaant3
1Department of Computer Science and Engineering, University of Mauritius.
2Professor in Communication and Signal processing, University of Mauritius.
3Student, Computer Science Department, University of Mauritius.

ABSTRACT

One of the most challenging tasks facing the security expert remains the correct authentication of human being which has been crucial to the fabric of our society. The emphasis is now on reliable person identification for computerized devices as the latter forms an integral part of our daily activities. Moreover with increasing geographical mobility of individuals, the identification problem has become more acute. One alternative, to curb down the increasing number of computer related crimes, is through the use of keystroke biometric technology which represents an enhancement to password mechanisms by incorporating typing rhythms in it. Time captured being critical to the performance of the identifier, it is primordial that it satisfies certain requirements at a suitable degree of acceptability This paper presents an evaluation of timing options for keystroke dynamics paying attention to their repeatability and reliability as well as their portability on different systems. In actual passwords schemes users enroll using one computer and access resources using other configurations at different locations without bothering about the different underlying operating systems.

KEYWORDS

Security, Authentication, Passwords, Biometrics, Keystroke, Typing rhythms, Timers

Original Source Link : http://airccse.org/journal/nsa/0710ijnsa05.pdf
http://airccse.org/journal/jnsa10_current.html

No comments:

Post a Comment

International Journal of Network Security & Its Applications (IJNSA) - ERA, WJCI Indexed

#crytography #protocols #datacenter #network #optimization #database #systemsecurity #spam #phishing #email #iot #internetsecurity #intrusio...