Skip to main content

User Authentication via Neural Network

  • Conference paper
  • First Online:
Book cover Artificial Intelligence: Methodology, Systems, and Applications (AIMSA 2000)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 1904))

Abstract

The major problem in the computer system is that users are now able to access data from remote places and perform transaction on- line. This paper reports on the experiment and performance of using keystroke dynamics as a user authentication method. The work is designed such that it is possible for the computer system to identify authorized and unauthorized user. This is desired to control access to a system that will assign the authorized user upon entering the system. The technique used to discriminate the data is Neural Network. This paper describes the application of neural networks to the problem of identifying specific users through the typing characteristics exhibited when typing their own name. The test carried out uses two kinds of neural network model, i.e. ADALINE and Backpropagation Network. A comparison of these two techniques are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Garcia, John D. (1986). “Personal Identification Apparatus” (U.S Patent 4,621,334).

    Google Scholar 

  2. Young, James R. (1989). “Method and apparatus for verifying an individual’s identity” (U.S Patent 4,805,222).

    Google Scholar 

  3. John Legget, Glen Williams. (1988). “Verifying identity via keystroke characteristics”. International Journal of Man-Machine Studies. 28, 67–76.

    Article  Google Scholar 

  4. Simon Haykin. (1994). “Neural Networks, A Comprehensive Foundation”. 1 st.ed.Macmillan College Publishing Company: Macmillan. 134–135.

    MATH  Google Scholar 

  5. Karla Yale (1997). “ Preparing the right data diet for training neural networks” IEEE Spectrum. 64–66.

    Google Scholar 

  6. Benjamin Miller (1994). “Vital Signs of Identity”. IEEE Spectrum. 22–30.

    Google Scholar 

  7. Kuperstein, Micheal. (1991). “ Self organizing neural network method and system for general classification of patterns”. (U.S Patent 5,048,100).

    Google Scholar 

  8. Weiss,Kenneth P. (1991). “ Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics”. (U.S Patent 4,998,279).

    Google Scholar 

  9. John Legget, Glen Williams dan Mark Usnick.(1991). “Dynamic identity verification via keystroke characteristics”. International Journal of Man-Machine Studies. 35, 859–870.

    Article  Google Scholar 

  10. Christopher Bishop.(1995). “Neural Networks for Pattern Recognition”. 2nd.ed. Bookcraft Ltd, Great Britian: Oxford University Press. 295–299.

    Google Scholar 

  11. Jacek M.Zurada.(1992).“Introduction to Artificial Neural System”. 2nd.ed. Access and Distribution, Singapore: West Publishing. 165–167,206–217.

    Google Scholar 

  12. Mark Beale.(1998).“Neural Network Toolbox, For Use with Matlab”. 5th.ed.. The Mathworks Inc, MA: The Mathworks Inc. 4–16-4–27, 5–3-5–17.

    Google Scholar 

  13. Carson, William C. (1983). “Keystroke queueing system”. (U.S Patent 4,410,957).

    Google Scholar 

  14. Wolf, Chris L.(1990). “ System for selectively modifying codes generated by touch type keyboard upon detecting of predetermined sequence of makes codes and break codes”.(U.S Patent 4,937,778).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ahmad, A.M., Abdullah, N.N. (2000). User Authentication via Neural Network. In: Artificial Intelligence: Methodology, Systems, and Applications. AIMSA 2000. Lecture Notes in Computer Science, vol 1904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45331-8_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-45331-8_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41044-7

  • Online ISBN: 978-3-540-45331-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics