SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1765
KEYSTROKE DYNAMICS FOR USER AUTHENTICATION
Priyanka Namnaik1, Rajeshree Kurale2, Sanyukta Mahindrakar3
1,2,3Department of Information technology, Shah and Anchor Kutchhi Engineering College
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract— In this paper, authentication methodisbasedon
keystroke along with the current username and password
system. a multifactor authentication scheme using the
keystroke dynamics. The scheme is composed of two
keystroke patterns levels. In this first level, the speed of each
user’spassword is measured depending on the comparisons
between the registered speeds with different calculated
thresholds. In the case of large deviations in the typing
speeds, the user must transit to the second authentication
level. In this level, the user decrypts ciphered thresholds by
using his/her private key. The objective of this paper is to
provide a strong authentication method and to assign a high
accepted value of the typing speed by training the user to
type his/her password 100 times as a pretext before the
actual registration level . In this case, the system results in a
high precise speed values. The system is analyzed using
different statistical measurements.
Keywords: Security, Authentication,keystroke,typingspeed.
I. INTRODUCTION
One of the important challenges in user
authentication is security and privacy. Furthermore,
authentication plays an important role in preservingsecurity
and privacy of applications, data or resources, especially, in
wide spread networks, internet, cloud services and even
standalone desktop applications. It is use for protect shared
data from unauthorized persons. In other words, an
authentication mechanism determineshow userisidentified
and verified to gain access.
Verification of user’s identity is the most important
goal of authentication [2]. Passwordsareadoptedasthemost
widely used security mechanism. It is obvious that,
passwords (something the user knows) are not a verysecure
mechanism for authenticating usersbecause of itslimitation,
as well as, it is difficult to confirm that the demand is from
the rightful owner. Strong method of authentication should
cover one or several factors of identification to improve
security. Keystroke dynamics is the processof analyzing and
measuring the style in which any user types the elements of
his/her secret information by the keyboard. This process is
either done at either during a complete session, which is
called continuous keystroke dynamicsorduringlogintimeor
after a predetermined period of time which is called static
keystroke dynamics.
There are 3 main step in keystroke dynamic : data
collection, feature extraction and pattern classification. In
data collection, raw data is collected and the registered to
include all typed keys, related timing information and key
events (press or down key, and release or up key) in profile.
Feature extraction:
Fig 1.Dwell time and Flight time
There are several keystroke features, but some of the
essential features extracted by researchers are :
 Session time is the total time spent by the user on
the system. Session time is calculated by computing
the difference between the starting time and user
response times.
 Keystroke latency is the time interval between the
key release of the first keystroke and the key press
of the second keystroke. However, the latency of
longer n-graphs ( n > 2) is defined as the time
interval between the down key events of the first
and last keystrokes that make up the n-graph.
 Dwell Time is the time (in milliseconds) between a
key press and a key release of the same key.
 Frequency of error is the use of backspace key and
delete key. This rate may provide evidence of a state
of confusion, as individuals who tend to delete are
more likely to be confused.
II. PROPOSED SYSTEM
A. Overview
This section presents the proposed method in for
user authentication using keystroke dynamics. There are
different parameters for measuring keystrokesofapplication
users; keystroke duration is considered as an attribute to
measure keystrokes of uses. Asshown in fig. 3.1, thismethod
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1766
is multi-factor authentication. It usesusername/passwordas
well as keystrokes authentication to identify users.
B. New User Registration:
The process is shown in fig. 3.1 fortheregistrationof
the first time user. User has to set the username and
password along with a long Sample Textalreadypresentedto
the user. The username – password binding will be stored in
the database. Also, the Dwell Time and Flight Time of the
password entered will also be stored. The password,
keystroke dynamics (dwell time and flight time) of the
password and the sample text will be used for authentication
of the user later.
Fig B: New User Registration
C. User Login Procedure:
When a user wants to login to the system, he needs
to enter the username and password which will be checked
by the system. Apart from this, the system will also calculate
the values of the keystroke dynamics of the entered
password and will compare it with the ones stored in the
database. If the match is within an acceptable limit then the
second level of authentication is done. For the third level of
authentication, the user hasto type a phrase displayedonthe
screen in a window which will be a random challenge to the
user. The keystroke dynamics of this challenge will be
compared with that of stored valuesof the Sample Text from
the Registration phase.
Fig C: User Login Procedure
III IMPLEMENTATION DETAILS
1. Registration Module:
a. Enter Username: It is checked in the username
module and if username already exists, user
has to change its username and register with a
username which is available.
b. Enter Password: After entering a unique
username, user is supposed to enter his choice
of password and the passwordisencryptedand
stored in a module known aspasswordmodule
and along with password it also stores the
factors (flight time, dwell time and total time
taken to enter the password) of keystroke
authentication.
c. Registration: A registration module is created
which links to various modules that are
username, password.
Fig 3:Registration Procedure
2. Login Phase
a. User enters his username and password:
Username and password are matched with
username and password module, if username
matches, corresponding password is checked
and if it matches the biometric factors of
keystroke authentication stored in module, it
proceeds to next step of login. In order to
match the factors, we need to temporarilystore
the flight time, dwell time and total time when
user enters his password during login in the
login module.
b. If all factors and details match, login is
successful.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1767
Fig 2:Login Procedure
HARDWARE AND SOFTWARE SPECIFICATIONS
Hardware Specification:
Processor : Any Processor above 1.9GHz.
RAM : 2 GB.
Hard Disk : 10 GB.
Input device : Standard Keyboard and Mouse.
Output device : VGA and High Resolution Monitor.
Software Specification:
Operating System : Windows7
Language : Java
Database : MySQL 5.0 & Above
Tool : JDK 1.5 & Above, Eclipse IDE
IV. ALGORITHM
Various features to be extracted to implement the algorithm
is calculated using following equations:
 Session time = Starting time – User response time
 Flight time = ∑Releasing time of key 1 − ∑pressing
time of key 2
 Dwell time = ∑Releasing time of key − ∑pressing
time of same key.
 Keystroke latency = ∑Releasing time of key 1 −
∑pressing time of key 2 per sentence.
.
After the feature extraction and feature selection
phase, the next phase is the classification phase where the
matching between the template stored and sample provided
during the session takes place. There are various methods
used for classification. These classification algorithms are
pattern reorganization based algorithms and decision tree.
V. PAGE DESIGN OF THE PROPOSED
AUTHENTICATION MODULE
Fig 4.1 sign up page of the proposed authentication module
Fig4.2 login page of the proposed authentication module
VI.SCOPE
The password based authentication system is used
almost everywhere. With this we can comfortably used
Keystroke based authentication as the keyboard is already
present, either physical or virtual. Any other factor may
require additional hardware like smart card reader or
biometric sensors. This flexibility provides an advantage to
deploy this mechanism virtually anywhere wherever
authentication is required.
VII. CONCLUSION
The keystroke and mouse featuresare combinedand
provides a high level security using keystroke parameters
called as dwell and flight time. These keystroke parameters
to provide high level of security. The combination of dwell
and flight time with single click shows better results. The
accuracy of combination of keystroke and mouse
authentication shows more than 85%. The future scope
includesthe identification of other parametersandtheuseof
another algorithm to improvise the level of security and
implementation of keystroke on touch screen system
(LAPTOP) and use of pressure keyboard.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1768
REFERENCES
1. Gil David, Anomaly detection approach to keystroke
Dynamics Based User Authentication,2017,ISCC..
2. Sahurdi, Novianto Badi Kurniawan , Keystroke
Dynamics for authentication using dynamics time
warping, 2016, Jaka Sembiring School of Electrical
Engineering & Informatics, Bandung, Indonesia.
3. Jordan Amman,Analysis of Strong Password Using
Keystroke Dynamics AuthenticationinTouchScreen
Devices, 2016, Cybersecurity and Cyberforensics
Conference.
4. yaw marfo missah ,keystroke dyanamic as an
additional security measured to passwaord
security on web based application ,2016

More Related Content

What's hot

Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
eSAT Journals
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
Darrell Smith
 

What's hot (20)

IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Secure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual AuthenticationSecure Code Generation for Multi-level Mutual Authentication
Secure Code Generation for Multi-level Mutual Authentication
 
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key CryptographyEmpirical Study of a Key Authentication Scheme in Public Key Cryptography
Empirical Study of a Key Authentication Scheme in Public Key Cryptography
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Jit dynamic cryptosystem
Jit dynamic cryptosystemJit dynamic cryptosystem
Jit dynamic cryptosystem
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEMONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
ONLINE SIGNATURE BASED APPLICATION LOCKING SYSTEM
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...QR code based authentication method for IoT applications using three security...
QR code based authentication method for IoT applications using three security...
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
CRYPTANALYSIS AND FURTHER IMPROVEMENT OF A BIOMETRIC-BASED REMOTE USER AUTHEN...
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Ijcnc050205
Ijcnc050205Ijcnc050205
Ijcnc050205
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 

Similar to IRJET- Keystroke Dynamics for user Authentication

Similar to IRJET- Keystroke Dynamics for user Authentication (20)

IRJET - TTL: Tap to Login
IRJET - TTL: Tap to LoginIRJET - TTL: Tap to Login
IRJET - TTL: Tap to Login
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET-  	  Web Application for Secured Two Factor AuthenticationIRJET-  	  Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor AuthenticationIRJET- Web Application for Secured Two Factor Authentication
IRJET- Web Application for Secured Two Factor Authentication
 
IRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor AuthenticationIRJET- Data Security with Multifactor Authentication
IRJET- Data Security with Multifactor Authentication
 
Enhanced Security Through Token
Enhanced Security Through TokenEnhanced Security Through Token
Enhanced Security Through Token
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with DealershipIRJET-Encryption of Broadcast with Dealership
IRJET-Encryption of Broadcast with Dealership
 
H364752
H364752H364752
H364752
 
Nt2580 Final Project Essay Examples
Nt2580 Final Project Essay ExamplesNt2580 Final Project Essay Examples
Nt2580 Final Project Essay Examples
 
Two Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed ServicesTwo Aspect Validation Control Frameworks for Online Distributed Services
Two Aspect Validation Control Frameworks for Online Distributed Services
 
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure VanetIRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
IRJET- Signrecrypting Proxy Re-Signature in Secure Vanet
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
Secure Key Encapsulation and Distribution Mechanism for Real Time Secure Mobi...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Recently uploaded (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 

IRJET- Keystroke Dynamics for user Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1765 KEYSTROKE DYNAMICS FOR USER AUTHENTICATION Priyanka Namnaik1, Rajeshree Kurale2, Sanyukta Mahindrakar3 1,2,3Department of Information technology, Shah and Anchor Kutchhi Engineering College ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract— In this paper, authentication methodisbasedon keystroke along with the current username and password system. a multifactor authentication scheme using the keystroke dynamics. The scheme is composed of two keystroke patterns levels. In this first level, the speed of each user’spassword is measured depending on the comparisons between the registered speeds with different calculated thresholds. In the case of large deviations in the typing speeds, the user must transit to the second authentication level. In this level, the user decrypts ciphered thresholds by using his/her private key. The objective of this paper is to provide a strong authentication method and to assign a high accepted value of the typing speed by training the user to type his/her password 100 times as a pretext before the actual registration level . In this case, the system results in a high precise speed values. The system is analyzed using different statistical measurements. Keywords: Security, Authentication,keystroke,typingspeed. I. INTRODUCTION One of the important challenges in user authentication is security and privacy. Furthermore, authentication plays an important role in preservingsecurity and privacy of applications, data or resources, especially, in wide spread networks, internet, cloud services and even standalone desktop applications. It is use for protect shared data from unauthorized persons. In other words, an authentication mechanism determineshow userisidentified and verified to gain access. Verification of user’s identity is the most important goal of authentication [2]. Passwordsareadoptedasthemost widely used security mechanism. It is obvious that, passwords (something the user knows) are not a verysecure mechanism for authenticating usersbecause of itslimitation, as well as, it is difficult to confirm that the demand is from the rightful owner. Strong method of authentication should cover one or several factors of identification to improve security. Keystroke dynamics is the processof analyzing and measuring the style in which any user types the elements of his/her secret information by the keyboard. This process is either done at either during a complete session, which is called continuous keystroke dynamicsorduringlogintimeor after a predetermined period of time which is called static keystroke dynamics. There are 3 main step in keystroke dynamic : data collection, feature extraction and pattern classification. In data collection, raw data is collected and the registered to include all typed keys, related timing information and key events (press or down key, and release or up key) in profile. Feature extraction: Fig 1.Dwell time and Flight time There are several keystroke features, but some of the essential features extracted by researchers are :  Session time is the total time spent by the user on the system. Session time is calculated by computing the difference between the starting time and user response times.  Keystroke latency is the time interval between the key release of the first keystroke and the key press of the second keystroke. However, the latency of longer n-graphs ( n > 2) is defined as the time interval between the down key events of the first and last keystrokes that make up the n-graph.  Dwell Time is the time (in milliseconds) between a key press and a key release of the same key.  Frequency of error is the use of backspace key and delete key. This rate may provide evidence of a state of confusion, as individuals who tend to delete are more likely to be confused. II. PROPOSED SYSTEM A. Overview This section presents the proposed method in for user authentication using keystroke dynamics. There are different parameters for measuring keystrokesofapplication users; keystroke duration is considered as an attribute to measure keystrokes of uses. Asshown in fig. 3.1, thismethod
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1766 is multi-factor authentication. It usesusername/passwordas well as keystrokes authentication to identify users. B. New User Registration: The process is shown in fig. 3.1 fortheregistrationof the first time user. User has to set the username and password along with a long Sample Textalreadypresentedto the user. The username – password binding will be stored in the database. Also, the Dwell Time and Flight Time of the password entered will also be stored. The password, keystroke dynamics (dwell time and flight time) of the password and the sample text will be used for authentication of the user later. Fig B: New User Registration C. User Login Procedure: When a user wants to login to the system, he needs to enter the username and password which will be checked by the system. Apart from this, the system will also calculate the values of the keystroke dynamics of the entered password and will compare it with the ones stored in the database. If the match is within an acceptable limit then the second level of authentication is done. For the third level of authentication, the user hasto type a phrase displayedonthe screen in a window which will be a random challenge to the user. The keystroke dynamics of this challenge will be compared with that of stored valuesof the Sample Text from the Registration phase. Fig C: User Login Procedure III IMPLEMENTATION DETAILS 1. Registration Module: a. Enter Username: It is checked in the username module and if username already exists, user has to change its username and register with a username which is available. b. Enter Password: After entering a unique username, user is supposed to enter his choice of password and the passwordisencryptedand stored in a module known aspasswordmodule and along with password it also stores the factors (flight time, dwell time and total time taken to enter the password) of keystroke authentication. c. Registration: A registration module is created which links to various modules that are username, password. Fig 3:Registration Procedure 2. Login Phase a. User enters his username and password: Username and password are matched with username and password module, if username matches, corresponding password is checked and if it matches the biometric factors of keystroke authentication stored in module, it proceeds to next step of login. In order to match the factors, we need to temporarilystore the flight time, dwell time and total time when user enters his password during login in the login module. b. If all factors and details match, login is successful.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1767 Fig 2:Login Procedure HARDWARE AND SOFTWARE SPECIFICATIONS Hardware Specification: Processor : Any Processor above 1.9GHz. RAM : 2 GB. Hard Disk : 10 GB. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. Software Specification: Operating System : Windows7 Language : Java Database : MySQL 5.0 & Above Tool : JDK 1.5 & Above, Eclipse IDE IV. ALGORITHM Various features to be extracted to implement the algorithm is calculated using following equations:  Session time = Starting time – User response time  Flight time = ∑Releasing time of key 1 − ∑pressing time of key 2  Dwell time = ∑Releasing time of key − ∑pressing time of same key.  Keystroke latency = ∑Releasing time of key 1 − ∑pressing time of key 2 per sentence. . After the feature extraction and feature selection phase, the next phase is the classification phase where the matching between the template stored and sample provided during the session takes place. There are various methods used for classification. These classification algorithms are pattern reorganization based algorithms and decision tree. V. PAGE DESIGN OF THE PROPOSED AUTHENTICATION MODULE Fig 4.1 sign up page of the proposed authentication module Fig4.2 login page of the proposed authentication module VI.SCOPE The password based authentication system is used almost everywhere. With this we can comfortably used Keystroke based authentication as the keyboard is already present, either physical or virtual. Any other factor may require additional hardware like smart card reader or biometric sensors. This flexibility provides an advantage to deploy this mechanism virtually anywhere wherever authentication is required. VII. CONCLUSION The keystroke and mouse featuresare combinedand provides a high level security using keystroke parameters called as dwell and flight time. These keystroke parameters to provide high level of security. The combination of dwell and flight time with single click shows better results. The accuracy of combination of keystroke and mouse authentication shows more than 85%. The future scope includesthe identification of other parametersandtheuseof another algorithm to improvise the level of security and implementation of keystroke on touch screen system (LAPTOP) and use of pressure keyboard.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 04 | Apr-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1768 REFERENCES 1. Gil David, Anomaly detection approach to keystroke Dynamics Based User Authentication,2017,ISCC.. 2. Sahurdi, Novianto Badi Kurniawan , Keystroke Dynamics for authentication using dynamics time warping, 2016, Jaka Sembiring School of Electrical Engineering & Informatics, Bandung, Indonesia. 3. Jordan Amman,Analysis of Strong Password Using Keystroke Dynamics AuthenticationinTouchScreen Devices, 2016, Cybersecurity and Cyberforensics Conference. 4. yaw marfo missah ,keystroke dyanamic as an additional security measured to passwaord security on web based application ,2016