Three-layer authentication in keystroke dynamics using time based tool

2Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Having a secure and sound system is the most important need of the end-user. Confidential and authentic information about the system must be available to the genuine user when required. This paper presents a generalized Keystroke Dynamics Technique for identification of genuine users. The method works for the authentication of the user while user is entering the password to using the system. It is a three-layer approach which first check the typing pattern while entering the password then it also monitors the system while user is using the system. Different users have different typing pattern which could be used to recognize a user. For identification of the user a time-based tool is used to collect data pertaining to the typing time of each user for words of different lengths. This is a very easy and cost-effective way of collecting data for differentiating between a genuine user and imposter. At first layer elbow method is used to know unknown targets depending upon different word combinations. For the second layer principal component analysis (PCA) is used to find suitable factors where user typing pattern is making users indistinguishable. For the third step Long-Short Term Memory (LSTM) technique is used to forecast whether the user is a genuine user or an imposter.

Cite

CITATION STYLE

APA

Bhasin, N., & Tarar, S. (2021). Three-layer authentication in keystroke dynamics using time based tool. In Journal of Physics: Conference Series (Vol. 1714). IOP Publishing Ltd. https://doi.org/10.1088/1742-6596/1714/1/012030

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free