CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Utilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW

by Osei Boakye Michael, Yaw Marfo Missah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 149 - Number 5
Year of Publication: 2016
Authors: Osei Boakye Michael, Yaw Marfo Missah
10.5120/ijca2016911402

Osei Boakye Michael, Yaw Marfo Missah . Utilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW. International Journal of Computer Applications. 149, 5 ( Sep 2016), 35-44. DOI=10.5120/ijca2016911402

@article{ 10.5120/ijca2016911402,
author = { Osei Boakye Michael, Yaw Marfo Missah },
title = { Utilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2016 },
volume = { 149 },
number = { 5 },
month = { Sep },
year = { 2016 },
issn = { 0975-8887 },
pages = { 35-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume149/number5/25995-2016911402/ },
doi = { 10.5120/ijca2016911402 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:53:56.330231+05:30
%A Osei Boakye Michael
%A Yaw Marfo Missah
%T Utilizing Keystroke Dynamics as an Additional Security Measure to Password Security in Computer Web-based Applications - A Case Study of UEW
%J International Journal of Computer Applications
%@ 0975-8887
%V 149
%N 5
%P 35-44
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Keystroke Dynamics is one of the well-known and economical behavioral biometric developments that attempt to recognize the genuineness of a client when the client invokes his keystrokes from a computer keyboard. The keystrokes pattern helps to determine the typing behaviour of users of the system thus serves as the benchmark for identity verification. This paper displays the use of biometrics to augment traditional passwords security in computer web-based application systems. The system was evaluated base on these criteria; authenticating legitimate user against imposter user and a guess imposter user of the system. Also, evaluation of character timings was performed to know the best combination of strings to use in setting passwords in systems where keystroke dynamics would be applied in order to achieve high efficiency. This study concludes that the use of keystrokes dynamics in augmenting password security in computer web-based applications should be embraced.

References
  1. Monrose, R., & Rubin, A., (1999). “Keystroke Dynamics as a Biometric for Authentication”. Future Generation Computer Systems, 16(4) pp. 351- 359. .
  2. Monrose, F., Rubin, A., (1997).“Authentication via Keystroke Dynamics”, Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48-56.
  3. Monrose, F., Reiter, M. K and Wetzel S. (2001). Password hardening based on keystroke dynamics. Bell Labs, Lucent Technologies, Murray Hill, N.J., US Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Gunetti, D. and Picardi, C. (2012). Keystroke Analysis as a Tool for Intrusion Detection. “Continuous Authentication Using Biometrics: Data, Model, and Metrics”. Issa Traore: IGI Global.
  5. Li, J. (2003). Keystroke Analysis: A Novel Type of Authentication. Accessed online through: http://individual.utoronto.ca/jamyli/writing/keystroke.
  6. Brochoux, A. and Clarke, N. L. (2008). Deployment of Keystroke Analysis on a Smartphone. Australian Information Security Management Conference, Edith Cowan University: Perth, Western Australia. Source: http://ro.ecu.edu.au/ism/48.
  7. Bryman, A. and Bell, E. (2007): “Business research methods”, 2nd ed. Oxford: Oxford University Press.
  8. Gagbla, K. G. (2005). Securing E-Business Applications. Using Keystroke Dynamics as a Biometric Authentication Technique.
  9. Attila M., Zoltán B., and László C. (2007). Strengthening Passwords by Keystroke Dynamics IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. Dortmund, Germany
Index Terms

Computer Science
Information Sciences

Keywords

Keystroke dynamics password biometrics web-based application Terminus time Source time.