Abstract
The major problem in the computer system is that users are now able to access data from remote places and perform transaction on- line. This paper reports on the experiment and performance of using keystroke dynamics as a user authentication method. The work is designed such that it is possible for the computer system to identify authorized and unauthorized user. This is desired to control access to a system that will assign the authorized user upon entering the system. The technique used to discriminate the data is Neural Network. This paper describes the application of neural networks to the problem of identifying specific users through the typing characteristics exhibited when typing their own name. The test carried out uses two kinds of neural network model, i.e. ADALINE and Backpropagation Network. A comparison of these two techniques are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Garcia, John D. (1986). “Personal Identification Apparatus” (U.S Patent 4,621,334).
Young, James R. (1989). “Method and apparatus for verifying an individual’s identity” (U.S Patent 4,805,222).
John Legget, Glen Williams. (1988). “Verifying identity via keystroke characteristics”. International Journal of Man-Machine Studies. 28, 67–76.
Simon Haykin. (1994). “Neural Networks, A Comprehensive Foundation”. 1 st.ed.Macmillan College Publishing Company: Macmillan. 134–135.
Karla Yale (1997). “ Preparing the right data diet for training neural networks” IEEE Spectrum. 64–66.
Benjamin Miller (1994). “Vital Signs of Identity”. IEEE Spectrum. 22–30.
Kuperstein, Micheal. (1991). “ Self organizing neural network method and system for general classification of patterns”. (U.S Patent 5,048,100).
Weiss,Kenneth P. (1991). “ Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics”. (U.S Patent 4,998,279).
John Legget, Glen Williams dan Mark Usnick.(1991). “Dynamic identity verification via keystroke characteristics”. International Journal of Man-Machine Studies. 35, 859–870.
Christopher Bishop.(1995). “Neural Networks for Pattern Recognition”. 2nd.ed. Bookcraft Ltd, Great Britian: Oxford University Press. 295–299.
Jacek M.Zurada.(1992).“Introduction to Artificial Neural System”. 2nd.ed. Access and Distribution, Singapore: West Publishing. 165–167,206–217.
Mark Beale.(1998).“Neural Network Toolbox, For Use with Matlab”. 5th.ed.. The Mathworks Inc, MA: The Mathworks Inc. 4–16-4–27, 5–3-5–17.
Carson, William C. (1983). “Keystroke queueing system”. (U.S Patent 4,410,957).
Wolf, Chris L.(1990). “ System for selectively modifying codes generated by touch type keyboard upon detecting of predetermined sequence of makes codes and break codes”.(U.S Patent 4,937,778).
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ahmad, A.M., Abdullah, N.N. (2000). User Authentication via Neural Network. In: Artificial Intelligence: Methodology, Systems, and Applications. AIMSA 2000. Lecture Notes in Computer Science, vol 1904. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45331-8_30
Download citation
DOI: https://doi.org/10.1007/3-540-45331-8_30
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41044-7
Online ISBN: 978-3-540-45331-4
eBook Packages: Springer Book Archive