Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm

Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm

Priya C. V., K. S. Angel Viji
Copyright: © 2021 |Volume: 15 |Issue: 4 |Pages: 20
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781799859895|DOI: 10.4018/IJISP.2021100106
Cite Article Cite Article

MLA

Priya C. V., and K. S. Angel Viji. "Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm." IJISP vol.15, no.4 2021: pp.98-117. http://doi.org/10.4018/IJISP.2021100106

APA

Priya C. V. & Viji, K. S. (2021). Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm. International Journal of Information Security and Privacy (IJISP), 15(4), 98-117. http://doi.org/10.4018/IJISP.2021100106

Chicago

Priya C. V., and K. S. Angel Viji. "Keystroke Dynamics-Based Authentication System Using Empirical Thresholding Algorithm," International Journal of Information Security and Privacy (IJISP) 15, no.4: 98-117. http://doi.org/10.4018/IJISP.2021100106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

In a password-based authentication technique, whenever the typed password and username matches the system database, the secure login page allows the client to access it. Despite the password matching, the proposed method checks the similarity between the typing rhythm of entered password and the rhythm of password samples in client's database. In this paper, a novel algorithmic procedure is presented to authenticate the legal client based on empirical threshold values obtained from the timing information of the client's keystroke dynamics. The exploratory outcomes demonstrate an impressive diminish in both false rejection rate and false acceptance rate. Equal error rate and authentication accuracy are also assessed to show the superiority and robustness of the method. Therefore, the proposed keystroke dynamics-based authentication method can be valuable in securing the system protection as a correlative or substitute form of client validation and as a useful resource for identifying the illegal invasion.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.