Keystroke Authentication with Back Propagation Neural Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Downloads: 137 | Weekly Hits: ⮙5

Research Paper | Computer Science & Engineering | Iraq | Volume 7 Issue 1, January 2018

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Security threats to computers and networks have increased in considerably because of the increasing use of computer systems and networks in almost every aspect of our daily lives, traditionally, key stroke dynamic authentication is vastly used to authenticate legitimate user in the current system but this method has many loop holes. The aim of this paper is to enhance the continuous authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication, this biometric technologies is of the most well known and not costly behavior.This paper utilizes keystroke features including Dwell time (DT), Flight time (FT), Up-Up time (UUT), Down-Down time (DDT) and a mixture of these features as strong new keystroke feature. The Back Propagation neural network is used with two cases case-1, used the Back Propagation neural network with sigmoid function, the second case used the Back Propagation neural network with bipolar function, both of these two cases used with five different cases of features as mentioned above. These times are used to distinguish between the authentic users and impostors. Results of the experiments demonstrate that the Back Propagation network with mixed four features in case-1 with mixed of four features is more efficient comparable to case-2 and provide low False Accept Rate (FAR) and False Reject Rate (FRR) and high accuracy

Keywords: Back propagation, Biometrics, Continuous Keystroke, Dwell Time, Flight Time, Up-Up Time, User Authentication

Edition: Volume 7 Issue 1, January 2018

Pages: 809 - 813

Share this Article

How to Cite this Article?

Qaswaa K. Aboud, "Keystroke Authentication with Back Propagation Neural Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20179346, Volume 7 Issue 1, January 2018, 809 - 813

Enter Your Registered Email Address





Similar Articles with Keyword 'Back propagation'

Downloads: 103 | Weekly Hits: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1812 - 1815

A Survey on Domain Name Categorization Using Artificial Neural Networks

Akshay S. Dhomble, Disha Deotale

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article

Downloads: 109 | Weekly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1592 - 1597

Privacy Conserving Gradient Descent Method Applied for Neural Network with Distributed Datasets

Sachin P. Yadav, Amit B. Chougule

Share this Article

Downloads: 111 | Monthly Hits: ⮙6

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2471 - 2473

Study of Altered Fingerprint Detection Using Artificial Neural Network

Pravin Keshav Patil, Sandip S. Patil, N. P. Jagtap

Share this Article

Downloads: 112 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1797 - 1799

Analysis Speed of Sending HL7 Data with use of TrainLM Algorithm in Medical Informatics

Kanika Sharma, Rupinder Kaur Gurm

Share this Article

Similar Articles with Keyword 'Biometrics'

Downloads: 67 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 82 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Downloads: 105 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 5 Issue 11, November 2016

Pages: 1654 - 1660

An Adaptive Use of Deffie Hellman Algorithm by Digital Images for Generating Secure Shared Key

Zainalabideen Abdullsamd Rasheed

Share this Article

Downloads: 107 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 2099 - 2102

Effect of Aging on Human Iris and Examine Their Authentication in Bio Metrics

Namrata, Manju Sharma

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1212 - 1215

A Novel Hybrid Face Recognition Algorithm Based On Neural Network with Fuzzy Sets

Raunil Singh, Kiran Gupta

Share this Article

Similar Articles with Keyword 'Flight Time'

Downloads: 124 | Weekly Hits: ⮙2

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 6 Issue 9, September 2017

Pages: 956 - 961

An Improved Blood Splatters Analysis Technique

Utkarsha Chirmade, Namrata Sharma, B.S Patil

Share this Article

Downloads: 137 | Weekly Hits: ⮙5

Research Paper, Computer Science & Engineering, Iraq, Volume 7 Issue 1, January 2018

Pages: 809 - 813

Keystroke Authentication with Back Propagation Neural Network

Qaswaa K. Aboud

Share this Article

Similar Articles with Keyword 'User Authentication'

Downloads: 104 | Weekly Hits: ⮙3 | Monthly Hits: ⮙14

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 598 - 602

Dynamic Key Generation Algorithm for User Authentication at Mobile Cloud Enviroinment

Deepak G, Dr. Pradeep. B. S, Shreyas Srinath

Share this Article

Downloads: 107 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1604 - 1610

A Novel Model for S.M.S Security and SPAM Detection

Nikhila Zalpuri

Share this Article

Downloads: 108 | Monthly Hits: ⮙5

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2469 - 2472

A Survey of Advance Multi-Factor Authentication and Multi-Keyword Ranked Search for Encrypted Cloud Data

Snehal Rahul Patil, Shiwani Sthapak

Share this Article

Downloads: 108 | Weekly Hits: ⮙2 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2452 - 2457

A New Security Mechanism for Graphical Password Authentication using Combo Captcha in Video Technology

R. Buvanesvari, V. Prasath

Share this Article

Downloads: 108 | Weekly Hits: ⮙1 | Monthly Hits: ⮙10

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1048 - 1052

Authentication by Equalizing the Graphical Bars

Salim Istyaq

Share this Article



Top