Keystroke Authentication with Back Propagation Neural Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Security threats to computers and networks have increased in considerably because of the increasing use of computer systems and networks in almost every aspect of our daily lives, traditionally, key stroke dynamic authentication is vastly used to authenticate legitimate user in the current system but this method has many loop holes. The aim of this paper is to enhance the continuous authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication, this biometric technologies is of the most well known and not costly behavior.This paper utilizes keystroke features including Dwell time (DT), Flight time (FT), Up-Up time (UUT), Down-Down time (DDT) and a mixture of these features as strong new keystroke feature. The Back Propagation neural network is used with two cases case-1, used the Back Propagation neural network with sigmoid function, the second case used the Back Propagation neural network with bipolar function, both of these two cases used with five different cases of features as mentioned above. These times are used to distinguish between the authentic users and impostors. Results of the experiments demonstrate that the Back Propagation network with mixed four features in case-1 with mixed of four features is more efficient comparable to case-2 and provide low False Accept Rate (FAR) and False Reject Rate (FRR) and high accuracy

Keywords: Back propagation, Biometrics, Continuous Keystroke, Dwell Time, Flight Time, Up-Up Time, User Authentication

Edition: Volume 7 Issue 1, January 2018

Pages: 809 - 813

Share this Article

How to Cite this Article?

Qaswaa K. Aboud, "Keystroke Authentication with Back Propagation Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20179346, Volume 7 Issue 1, January 2018, 809 - 813

146 PDF Views | 113 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Back propagation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1797 - 1799

Analysis Speed of Sending HL7 Data with use of TrainLM Algorithm in Medical Informatics

Kanika Sharma, Rupinder Kaur Gurm

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1812 - 1815

A Survey on Domain Name Categorization Using Artificial Neural Networks

Akshay S. Dhomble, Disha Deotale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2260 - 22265

Finding Summary of Text Using Neural Networks and Rhetorical Structure Theory

Sarda A. T., Kulkarni A. R.

Share this Article

Similar Articles with Keyword 'Biometrics'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 3173 - 3178

An Overview of Pattern Recognition Applications and Its Approaches: A Review

Rajleen Kaur

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 7, July 2017

Pages: 1670 - 1675

Experimental Study of a Person Identification Framework Based on Combining Left and Right Palmprint Images

Mane Bhagyashri, Kalyankar Pravin

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1979 - 1982

Palm Vein Authentication: A Review

Gitanjali Sikka, Er. Vikas Wasson

Share this Article

Similar Articles with Keyword 'Flight Time'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 956 - 961

An Improved Blood Splatters Analysis Technique

Utkarsha Chirmade, Namrata Sharma, B.S Patil

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018

Pages: 809 - 813

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Share this Article

Similar Articles with Keyword 'User Authentication'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 852 - 855

An Efficient User Authentication using Captcha and Graphical Passwords-A Survey

S. Karthika, Dr. P. Devaki

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article
Top