2007 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications 2007
DOI: 10.1109/idaacs.2007.4488486
|View full text |Cite
|
Sign up to set email alerts
|

Strengthening Passwords by Keystroke Dynamics

Abstract: This document presents the application of biometrics to strength conventional passwords. We show methods to analyze and compare users' keystroke patterns to be able to verify their identity when entering the password into a computer system. The problem's difficulty arises from the fact that only a very limited amount data is available and that new users can come and others may leave the system meantime. That is we are not allowed to re-evaluate all users' data during the application. We show test results based… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Instead of updating the keystroke reference template, [ 35 ] proposed to readjust the matching threshold. This method circumvents the complexity of retraining sample data over potentially complex algorithm.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Instead of updating the keystroke reference template, [ 35 ] proposed to readjust the matching threshold. This method circumvents the complexity of retraining sample data over potentially complex algorithm.…”
Section: Methodsmentioning
confidence: 99%
“…Some preprocessing procedures may be applied before feature extraction to ensure or to increase the quality of feature data. These steps may include feature selection [ 31 ], dimension reduction [ 32 ], and outlier detection [ 33 35 ].…”
Section: Keystroke Dynamicsmentioning
confidence: 99%
“…Using the four features, authors achieved a false rejection rate of 1.45% and a false acceptance rate of 1.89% for user authentication. Meszaros, et al [22], designed an adaptive distance-based threshold on features to authenticate users. Harun, et al [34], proposed a multilayer perceptron neural network with a backpropagation learning algorithm as a classifier.…”
Section: Related Workmentioning
confidence: 99%
“…Keystroke dynamics can be categorized as fixed-text and free-text. In fixed-text [12], [14], [16], [17], [21], [22], users type a specific passphrase such as a user id and a corresponding password in a login form, while free-text [4], [6], [10], [13], [19], [20], [23] is where users type in a free uncontrolled environment. Users can type, and therefore, create keystrokes, from either physical keyboards [12] or from touch screen keyboards [16].…”
Section: Introductionmentioning
confidence: 99%
“…These stringent requirements make people adopt unsafe practices such as record their password close to the authentication device, share with friends and use same passwords on multiple accounts or use familiar names. To reduce the number of security incidents, inclusion of the information contained in the "actions" category has been proposed [8,9].…”
Section: Introductionmentioning
confidence: 99%