Enhanced Authentication Using Keystroke and Mouse Dynamics

Article Preview

Abstract:

“Biometrics” is used to detect an intruder based on anomaly intrusion detection system. A new technique is introduced that is user profiling based on Biometrics which is very accurate than Statistical profiling since they are based on behavioral characteristics of user. A new biometrics based technique, which can be used to detect intrusion without the need for any special hardware implementation and without forcing the user to do special actions. The techniques based on “keystroke dynamics” and “mouse dynamics” biometrics does not allow special hardware device for data collection and does not allow passive monitoring. Mouse dynamics is used in GUI base applications, whereas a keyboard is essential for command line base applications.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

230-234

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Romain Giot, Mohammad EI-Abed and Christopher Rosenberger, Keystroke dynamics authentication for collaborative systems, IEEE Computer Society (2009), p.172–179.

DOI: 10.1109/cts.2009.5067478

Google Scholar

[2] J. Hu, D. Gingrich and A. Sentosa, A k-nearest neighbor approach for user authentication through biometric keystroke dynamics, Proceedings of IEEE International Conference on Communications (2008) p.1556–1560, ISBN: 978-1-4244-2075-9.

DOI: 10.1109/icc.2008.301

Google Scholar

[3] Chao Shen; Zhongmin Cai; Xiaohong Guan; Huilan Sha; Jingzi Du, Feature Analysis of Mouse Dynamics in Identity Authentication and Monitoring, Proceedings of IEEE International Conference on Communications (2009) pp.1-5, ISBN: 978-1-4244-3435-0.

DOI: 10.1109/icc.2009.5199032

Google Scholar

[4] Gjovik Univ. Coll., Gjovik, Norway, A Login System Using Mouse Dynamics, Intelligent Information Hiding and Multimedia Signal Processing, 2009. IIH- MSP '09. Fifth International Conference on 2009, pp.1072-1077 , ISBN: 978-1-4244-4717-6.

DOI: 10.1109/iih-msp.2009.77

Google Scholar

[5] Ahmed Awad E. Ahmed, and Issa Traore, member IEEE, Anomaly Intrusion Detection based on Biometrics", Information Assurance Workshop, 2005. IAW , 05. Proceedings from the Sixth Annual IEEE SMC, p.452 – 453, ISBN: 0-7803-9290-6.

DOI: 10.1109/iaw.2005.1495997

Google Scholar

[6] Francesco Bergadano, Daniele Gunetti and Claudia picardi University of Torino, User Authentication through keystroke Dynamics, ACM transactions on Information and security vol. 5 no. 4 November 2002, p.367 – 397, ISSN: 1094-9224.

DOI: 10.1145/581271.581272

Google Scholar

[7] Matyas. V, Toward Reliable User Authentication through Biometrics, IEEE Security and Privacy, vol. 1, no. 3, pp.45-49, May 2003, doi: 10. 1109/MSECP. 2003. 1203221.

DOI: 10.1109/msecp.2003.1203221

Google Scholar

[8] Hyoung-joo lee, sungzoon cho, Retraining a keystroke dynamics based authenticator with impostor patterns, Proceedings of Science Direct Department of Industrial Engineering Seoul National University, San 56-1, Shillim-dong, Kwanak-gu, Seoul 151-744 Republic of Korea Article accepted 10 November 2006, volume 26, issue 4, pp.300-310.

DOI: 10.1016/j.cose.2006.11.006

Google Scholar

[9] Edmond lau, Xia Liu, Chan Xiao, and Xiau, Enhanced user Authentication through keystroke Biometrics , Computer and network security final paper report, Massachusetts Institute of Technology Dec 9 (2004).

Google Scholar

[10] Ahmed Awad E. Ahmed, and Issa Traore, member IEEE, A new Biometric Technology Based on Mouse Dynamics, Dependable and Secure Computing, IEEE Transactions on sept 2007, p.165 – 179,. ISSN: 1545-5971.

DOI: 10.1109/tdsc.2007.70207

Google Scholar