Keystroke Authentication with Back Propagation Neural Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Security threats to computers and networks have increased in considerably because of the increasing use of computer systems and networks in almost every aspect of our daily lives, traditionally, key stroke dynamic authentication is vastly used to authenticate legitimate user in the current system but this method has many loop holes. The aim of this paper is to enhance the continuous authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication, this biometric technologies is of the most well known and not costly behavior.This paper utilizes keystroke features including Dwell time (DT), Flight time (FT), Up-Up time (UUT), Down-Down time (DDT) and a mixture of these features as strong new keystroke feature. The Back Propagation neural network is used with two cases case-1, used the Back Propagation neural network with sigmoid function, the second case used the Back Propagation neural network with bipolar function, both of these two cases used with five different cases of features as mentioned above. These times are used to distinguish between the authentic users and impostors. Results of the experiments demonstrate that the Back Propagation network with mixed four features in case-1 with mixed of four features is more efficient comparable to case-2 and provide low False Accept Rate (FAR) and False Reject Rate (FRR) and high accuracy

Keywords: Back propagation, Biometrics, Continuous Keystroke, Dwell Time, Flight Time, Up-Up Time, User Authentication

Edition: Volume 7 Issue 1, January 2018

Pages: 809 - 813

Share this Article

How to Cite this Article?

Qaswaa K. Aboud, "Keystroke Authentication with Back Propagation Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20179346, Volume 7 Issue 1, January 2018, 809 - 813

72 PDF Views | 61 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Back propagation'

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 496 - 497

Naive Buyers Theorem for Heart Disease Prediction System

Indu Kumari, Dinesh Kumar Bahgel

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1812 - 1815

A Survey on Domain Name Categorization Using Artificial Neural Networks

Akshay S. Dhomble, Disha Deotale

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 2260 - 22265

Finding Summary of Text Using Neural Networks and Rhetorical Structure Theory

Sarda A. T., Kulkarni A. R.

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article

Similar Articles with Keyword 'Biometrics'

Comparative Studies, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1844 - 1847

A Comparative Studyon Kernel PCA and PCA Methods for Face Recognition

Mohammad Mohsen Ahmadinejad, Elizabeth Sherly

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2214 - 2217

An Adopted Multi-level Authentication Framework in Cloud Environment

Shaik Mujafar, K. B. V. Rama Narasimham

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1581 - 1584

Signature Authentication Using Biometric Methods

A. S. Syed Navaz, K. Durairaj

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2717 - 2720

Multi Biometrics: Overview and User Perception Survey

Harendra Singh Mahour, Hemant Makwana

Share this Article

Similar Articles with Keyword 'Flight Time'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 956 - 961

An Improved Blood Splatters Analysis Technique

Utkarsha Chirmade, Namrata Sharma, B.S Patil

Share this Article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018

Pages: 809 - 813

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Share this Article

Similar Articles with Keyword 'User Authentication'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 510 - 514

A Survey on Continuous User Identity Verification Using Biometric Traits for Secure Internet Services

Harshal A. Kute, D. N. Rewadkar

Share this Article
Top