Authenticating Passwords by Typing Pattern Biometrics

Rose Nakasi, Safari Yonasi, J. Ngubiri
{"title":"Authenticating Passwords by Typing Pattern Biometrics","authors":"Rose Nakasi, Safari Yonasi, J. Ngubiri","doi":"10.47672/AJCE.661","DOIUrl":null,"url":null,"abstract":"Passwords are a common measure used in Authentication systems to make sure that the users are who they say they are. The complexity of these Passwords is relied on while ensuring security. However, the role of complexity is limited. Users are forced to write down complex passwords since easy ones are easily guessed. This study aimed at evaluating the uniqueness of typing patterns of password holders so as to strengthen the authentication process beyond matching the string of characters. Using our own dataset, this research experimentally showed that k Nearest Neighbor algorithm using Euclidean distance as the metric, produces sufficient results to distinguish samples and detect whether they are from the same authentic user or from an impostor based on a threshold that was computed. Results obtained indicated that typing patterns are distinct even on simple guessable passwords and that typing pattern biometrics strengthens the authentication process. This research extends work in typing pattern analysis using k Nearest Neighbor machine learning approach to auto detect the password pattern of the authentic and non-authentic users. It also provides an investigation and assessment to the effect of using different k values of the KNN algorithm. Further to this field is the methodology for calculating an optimal threshold value with higher accuracy levels that acted as a basis for rejection or acceptance of a typing sample. Additionally is an introduction of a new feature metric of a combined dataset which is a concatenation of both the dwell and latency timings. A comparison of performance for independent and a combined dataset of the feature metrics was also evaluated.","PeriodicalId":148892,"journal":{"name":"American Journal of Computing and Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"American Journal of Computing and Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47672/AJCE.661","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Passwords are a common measure used in Authentication systems to make sure that the users are who they say they are. The complexity of these Passwords is relied on while ensuring security. However, the role of complexity is limited. Users are forced to write down complex passwords since easy ones are easily guessed. This study aimed at evaluating the uniqueness of typing patterns of password holders so as to strengthen the authentication process beyond matching the string of characters. Using our own dataset, this research experimentally showed that k Nearest Neighbor algorithm using Euclidean distance as the metric, produces sufficient results to distinguish samples and detect whether they are from the same authentic user or from an impostor based on a threshold that was computed. Results obtained indicated that typing patterns are distinct even on simple guessable passwords and that typing pattern biometrics strengthens the authentication process. This research extends work in typing pattern analysis using k Nearest Neighbor machine learning approach to auto detect the password pattern of the authentic and non-authentic users. It also provides an investigation and assessment to the effect of using different k values of the KNN algorithm. Further to this field is the methodology for calculating an optimal threshold value with higher accuracy levels that acted as a basis for rejection or acceptance of a typing sample. Additionally is an introduction of a new feature metric of a combined dataset which is a concatenation of both the dwell and latency timings. A comparison of performance for independent and a combined dataset of the feature metrics was also evaluated.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过输入模式生物识别技术验证密码
密码是身份验证系统中常用的一种措施,用于确保用户是他们所说的那个人。在保证安全性的同时,也依赖于这些密码的复杂性。然而,复杂性的作用是有限的。用户被迫写下复杂的密码,因为简单的密码很容易被猜到。本研究旨在评估密码持有者输入模式的唯一性,以加强字符串匹配之外的认证过程。使用我们自己的数据集,本研究实验表明,k最近邻算法使用欧几里得距离作为度量,产生足够的结果来区分样本,并根据计算的阈值检测它们是来自相同的真实用户还是来自冒名者。结果表明,即使在简单的可猜测密码上,输入模式也是不同的,输入模式生物识别技术加强了身份验证过程。本研究扩展了输入模式分析的工作,使用k最近邻机器学习方法自动检测真实用户和非真实用户的密码模式。并对使用不同k值的KNN算法的效果进行了研究和评价。这一领域的进一步发展是计算具有较高准确度的最佳阈值的方法,该方法作为拒绝或接受打字样本的基础。此外,还引入了一个组合数据集的新特征度量,它是驻留时间和延迟时间的串联。并对独立数据集和组合数据集的性能进行了比较。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A State-of-the-Art Review on Image Synthesis with Generative Adversarial Networks Application of Fractional Order PI/PID Voltage Controllers for Three-Phase Voltage Source Inverter with Dynamic Load A Web Based Employees’ Cyber Security Ethical Behavior Assessment (ECEBA) Model for Ugandan Commercial Banks Artificial Intelligence in Transportation Systems A Critical Review Impact of Artificial Intelligence on Accounting, Auditing and Financial Reporting
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1