Abstract
Immune systems have been used in the last years to inspire approaches for several computational problems. This paper focus on behavioural biometric authentication algorithms’ accuracy enhancement by using them more than once and with different thresholds in order to first simulate the protection provided by the skin and then look for known outside entities, like lymphocytes do. The paper describes the principles that support the application of this approach to Keystroke Dynamics, an authentication biometric technology that decides on the legitimacy of a user based on his typing pattern captured on he enters the username and/or the password and, as a proof of concept, the accuracy levels of one keystroke dynamics algorithm when applied to five legitimate users of a system both in the traditional and in the immune inspired approaches are calculated and the obtained results are compared.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Magalhães, S.T., Revett, K., Santos, H.: Password secured sites - stepping forward with keystroke dynamics. In: Proceedings of the IEEE International Conference on Next Generation Web Services Practices. IEEE CS Press (2005)
Maio, D., Maltoni, D., Cappelli, R., Wayman, J.L., Jain, A.K.: FVC2004: third fingerprint verification competition. In: Zhang, D., Jain, A.K. (eds.) ICBA 2004. LNCS, vol. 3072, pp. 1–7. Springer, Heidelberg (2004)
Maltoni, D., Maio, D., Jain, A.K., Prabhakar, S.: Handbook of Fingerprint Recognition. Springer, New York (2003)
Revett, K.R., Tenreiro de Magalhães, S., Santos, H.M.D.: On the use of rough sets for user authentication via keystroke dynamics. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol. 4874, pp. 145–159. Springer, Heidelberg (2007)
Revett, K., et al.: A machine learning approach to keystroke dynamics based user authentication. Int. J. Electron. Secur. Digit. Forensics 1(1), 55–70 (2007)
Stefan, D., Shu, X., Yao, D.D.: Robustness of keystroke-dynamics based biometrics against synthetic forgeries. Comput. Secur. 31(1), 109–121 (2012)
Revett, K., de Magalhães, S.T.: Cognitive biometrics: challenges for the future. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds.) ICGS3 2010. CCIS, vol. 92, pp. 79–86. Springer, Heidelberg (2010)
Revett, K., Jahankhani, H., de Magalhães, S.T., Santos, H.M.: User dynamics in graphical authentication systems. In: Jahankhani, H., Revett, K., Palmer-Brown, D. (eds.) Global E-Security, pp. 173–181. Springer, Berlin (2008)
Acknowledgements
This work has been supported by FCT – Fundação para a Ciência e Tecnologia within the Project Scope UID/CEC/00319/2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Santos, H., de Magalhães, S.T., Magalhães, M.J. (2015). An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms. In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-23276-8_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23275-1
Online ISBN: 978-3-319-23276-8
eBook Packages: Computer ScienceComputer Science (R0)