Identifiying the Authorised User by Typing Speed Comparison
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: Computers have become a ubiquitous part of the modern society. Online attacks on companies resulted in the shutdown of their networks and compromised the passwords and personal information of millions of users. Since we depend so much on computers to store and process sensitive information, it has become all the more necessary to secure them from intruders. For user authentication and identification in computer basedapplications, there is a need for simple, low-cost and unobtrusive device. A user can be defined as a person who attempts to access information stored on the computer or online using standard input device such as the keyboard. Use of biometrics such as face, fingerprints and signature requires additional tools to acquire the biometric which leads to an increase in costs. Use of a behavioral biometric which makes use of the typing pattern of an individual can be obtained using existing systems such as the standard keyboard, making it an inexpensive and extremely attractive technique. One of the major advantages of this biometric is that it is nonintrusive and can be applied covertly to augment existing cyber-security systems. In this paper we implement new process for password text analysis of keystrokes that joins monograph and digraph analysis, and uses a neural network to predict missing digraphs based on the relation between the monitored keystrokes.
Authors and Affiliations
S. Margarat Sheeba , G. Sahana , M. Sneka , M. Sowmiya , T. Sathish Kumar
Optimal Planning of the Production of Corpus Details on Metal Cutting Machines with the Help of Computer Numeric Control
Abstract: The optimal planning of details mechanical processing is a key problem, directly affecting the productivity and efficiency of the activity of a machine building company. The combinatorial character of the prob...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc network
Smartphone’s users has been increasing since last few years which provides numerous operations like accessing information through online mode, payment options, using utility applications, playing games. Sma...
Survey on adverse influencing factors in the way of successfulrequirement engineering
Abstract: Requirement engineering is the first phase for the development of any software. Software have beendiscarded due to poor and ambiguous requirements. This study based on the results of surveys conducted to...
Matching Facial Composite Sketches to Police Mug-Shot Images Based on Geometric Features.
Abstract: Composite sketches are frequently used to help track down suspects in a crime in which there is no photographic evidence. Automatic retrieval of photos of suspects from police mug-shot databases can help...
Improved and Energy Efficient Olsr Protocol Using Spanning Tree in Manet
Abstract: Mobile Adhoc Network is an autonomous and decentralized network. Its topology changes dynamically and message overhead is more due to its frequent change of topology in network. For reliable transmissio...