Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018
Keystroke Authentication with Back Propagation Neural Network
Qaswaa K. Aboud
Abstract: Security threats to computers and networks have increased in considerably because of the increasing use of computer systems and networks in almost every aspect of our daily lives, traditionally, key stroke dynamic authentication is vastly used to authenticate legitimate user in the current system but this method has many loop holes. The aim of this paper is to enhance the continuous authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication, this biometric technologies is of the most well known and not costly behavior. This paper utilizes keystroke features including Dwell time (DT), Flight time (FT), Up-Up time (UUT), Down-Down time (DDT) and a mixture of these features as strong new keystroke feature. The Back Propagation neural network is used with two cases case-1, used the Back Propagation neural network with sigmoid function, the second case used the Back Propagation neural network with bipolar function, both of these two cases used with five different cases of features as mentioned above. These times are used to distinguish between the authentic users and impostors. Results of the experiments demonstrate that the Back Propagation network with mixed four features in case-1 with mixed of four features is more efficient comparable to case-2 and provide low False Accept Rate (FAR) and False Reject Rate (FRR) and high accuracy
Keywords: Back propagation, Biometrics, Continuous Keystroke, Dwell Time, Flight Time, Up-Up Time, User Authentication
Edition: Volume 7 Issue 1, January 2018,
Pages: 809 - 813
How to Cite this Article?
Qaswaa K. Aboud, "Keystroke Authentication with Back Propagation Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=ART20179346, Volume 7 Issue 1, January 2018, 809 - 813
How to Share this Article?
Similar Articles with Keyword 'Back propagation'
A Survey on Domain Name Categorization Using Artificial Neural Networks
Akshay S. Dhomble, Disha Deotale
A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets
Raunil Singh, Kiran Gupta
Similar Articles with Keyword 'Biometrics'
Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution
Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga
Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics
Nisha, Jatinder Kansal, JPS Raina
Similar Articles with Keyword 'User Authentication'
Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment
Deepak G, Dr. Pradeep. B. S, Shreyas Srinath
A Novel Model for S.M.S Security and SPAM Detection
Similar Articles with Keyword 'Back'
University Event Management System
V. Balu, P. Vagish Krishnan, Varadarajan .M
Artificial Intelligence: The Backbone of Industry Evolution, Impact, and Future
Ralph Tichafa Tawanda Chawatama, Sun Shaowei
Similar Articles with Keyword 'propagation'
Trust Checking in Social Networks Using Data Mining
Energy Efficient QRS Detection Method for Portable and Personal Analysis of ECG Signal Obtained from Wearable Wireless ECG Body Sensors
Prineeta Sahni, Khushneet Kaur