International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Security threats to computers and networks have increased in considerably because of the increasing use of computer systems and networks in almost every aspect of our daily lives, traditionally, key stroke dynamic authentication is vastly used to authenticate legitimate user in the current system but this method has many loop holes. The aim of this paper is to enhance the continuous authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication, this biometric technologies is of the most well known and not costly behavior.This paper utilizes keystroke features including Dwell time (DT), Flight time (FT), Up-Up time (UUT), Down-Down time (DDT) and a mixture of these features as strong new keystroke feature. The Back Propagation neural network is used with two cases case-1, used the Back Propagation neural network with sigmoid function, the second case used the Back Propagation neural network with bipolar function, both of these two cases used with five different cases of features as mentioned above. These times are used to distinguish between the authentic users and impostors. Results of the experiments demonstrate that the Back Propagation network with mixed four features in case-1 with mixed of four features is more efficient comparable to case-2 and provide low False Accept Rate (FAR) and False Reject Rate (FRR) and high accuracy

Keywords: Back propagation, Biometrics, Continuous Keystroke, Dwell Time, Flight Time, Up-Up Time, User Authentication

Edition: Volume 7 Issue 1, January 2018

Pages: 809 - 813


How to Cite this Article?

Qaswaa K. Aboud, "Keystroke Authentication with Back Propagation Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20179346, Volume 7 Issue 1, January 2018, 809 - 813

35 PDF Views | 38 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Back propagation'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1154 - 1158

Face Illumination and Occlusion based Experimental Research on Face Recognition using Artificial Neural Network

Dr. V. S. Manjula

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016

Pages: 1949 - 1952

Facial Expression Recognition Based on Basic Expressions and Intensities Using K-Means Clustering

Rohit Pal, Dr. C. S. Satsangi

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1155 - 1159

A Novel Method for Cancer Gene Prediction Using Back Propagation Algorithm

Annakkodi P. S, Manjula Devi B

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1797 - 1799

Analysis Speed of Sending HL7 Data with use of TrainLM Algorithm in Medical Informatics

Kanika Sharma, Rupinder Kaur Gurm

Share this article

Similar Articles with Keyword 'Biometrics'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1055 - 1060

Iris Recognition Using Wavelet Transform and Neural Networks

Divya Pirale, Manisha Nirgude, Dr. Sachin Gengje

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2402 - 2405

Finger Vein Recognition Using Minutiae Extraction and Curve Analysis

Komal Bansal, Supreet Kaur

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1159 - 1164

An Efficient Boosting Approach for Score Level Fusion of Face and Palmprint Biometrics in Human Recognition

B. Sateesh Kumar, Dr. A. Govardhan

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2717 - 2720

Multi Biometrics: Overview and User Perception Survey

Harendra Singh Mahour, Hemant Makwana

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 2103 - 2106

Minutiae Based Fingerprint Matching for Identification and Verification

Deepika Sahu, Rashmi Shrivas

Share this article

Similar Articles with Keyword 'Flight Time'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 956 - 961

An Improved Blood Splatters Analysis Technique

Utkarsha Chirmade, Namrata Sharma, B.S Patil

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018

Pages: 809 - 813

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Share this article

Similar Articles with Keyword 'User Authentication'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1733 - 1735

Common Gateway Interface

Kamal Kathuria, Chaynika Kapoor, Apoorva Adlakha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2703 - 2708

Security to Outsource Data in Community Cloud with the Trusted Tenant System

Kundan Kunal, Dr. Latesh Malik

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this article

Top