Authenticating Passwords by Typing Pattern Biometrics

Authors

  • Rose Nakasi
  • Safari Yonasi
  • John Ngubiri

DOI:

https://doi.org/10.47672/ajce.661
Abstract views: 236
PDF downloads: 206

Abstract

Passwords are a common measure used in Authentication systems to make sure that the users are who they say they are. The complexity of these Passwords is relied on while ensuring security. However, the role of complexity is limited. Users are forced to write down complex passwords since easy ones are easily guessed. This study aimed at evaluating the uniqueness of typing patterns of password holders so as to strengthen the authentication process beyond matching the string of characters. Using our own dataset, this research experimentally showed that k Nearest Neighbor algorithm using Euclidean distance as the metric, produces sufficient results to distinguish samples and detect whether they are from the same authentic user or from an impostor based on a threshold that was computed. Results obtained indicated that typing patterns are distinct even on simple guessable passwords and that typing pattern biometrics strengthens the authentication process. This research extends work in typing pattern analysis using k Nearest Neighbor machine learning approach to auto detect the password pattern of the authentic and non-authentic users. It also provides an investigation and assessment to the effect of using different k values of the KNN algorithm. Further to this field is the methodology for calculating an optimal threshold value with higher accuracy levels that acted as a basis for rejection or acceptance of a typing sample. Additionally is an introduction of a new feature metric of a combined dataset which is a concatenation of both the dwell and latency timings. A comparison of performance for independent and a combined dataset of the feature metrics was also evaluated.

Downloads

Download data is not yet available.

Author Biographies

Rose Nakasi

Makerere University, Kampala, Uganda

 

Safari Yonasi

Mbarara University of Science and Technology, Mbarara, Uganda

 

John Ngubiri

Makerere University, Kampala, Uganda

 

References

S. Perkins E. Wolfart A. Walker, R. Fisher. Adaptive thresholding, 2003.

Bellovin. Limitations of the kerberos authentication system. ACM SIGCOM Computer Communication, 1, 1990.

Applied Biosystems. Data analysis on the abi prism7700 sequence detection system: Setting baselines and thresholds. Report 4370923 Revision A, Apple Computer, Inc, 2002.

V. Brennen. Kerberos infrastructure how to. Technical report by kerberos consortium. Report, 2004.

P S Dowland. A preliminary investigation of user authentication using continuous keystroke analysis. IFIP 8th Annual Working Conference on Information Security Management and Small Systems Security, 2001.

C. Xiao E. Lau, X. Liu and X. Yu. Enhanced user authentication through keystroke biometrics. Computer and Network Security, 6(857), 2004.

J. Hu K. Xi, Y. Tang. Correlation keystroke verification scheme for user access control in cloud computing environment. Computer, 54(10):16321644, 2011.

M. Kim. A survey of kerberos v and public key kerberos security. Report, 2009.

S. Lisa. Your password isn’t safe: 90 are vulnerable to hacking. Technical report by deloitte’s Canadian technology, media telecommunications arm. Report, 2013.

B McCord. Dna typing and threshold setting: Setting instrument parameters and thresholds. Report, International Forensic Research Institute, 2002.

B. Cukic N. Bartlow. Keystroke dynamics-based credential hardening systems. Springer, London, UK, 2009.

Mtenzi Omary. Machine learning approach to identifying the dataset threshold for the performance estimators in supervised learning. IJI, 3(3), 2010.

W.LisowskiR. Gaines. Authentication by key stroke timing:. Some primary results rand report. Report, R-2560-NSF, Rand Corporation, 1980.

SANS. Password protection policy, 2014.

S. Sanyal. Multifactor authentication and security. Fourth ACM Conference on Computer and Communications Security, 10, 2013.

Z.Xiaorong S. Yeqin, T.Zhongqun. Security analysis of kerberos 5 protocol. Computer Knowledge and Technology. Intelligent data analysis, IOS Pres, 6(6):1319–1320, 2010.

Z.Xiaorong S.Yeqin, T.Zhongqun. Security analysis of kerberos 5 protocol. Computer Knowledge and Technology. Intelligent data analysis, IOS Pres, 6(6):1319–1320, 2010.

Teh. A survey of keystroke dynamics biometric. Scientific World, 2013.

G. D. Tambakis Y. S. Boutalis, I. T. Andreadis. A fast fuzzy k-nearest neighbor algorithm for pattern classification. Intelligent data analysis, IOS Pres, 4, 2009.

Pedregosa, F. and Varoquaux, G. and Gramfort, A. and Michel, V. and Thirion, B. and Grisel, O. and Blondel, M. and Prettenhofer, P. and Weiss, R. and Dubourg, V. and Vanderplas, J. and Passos, A. and Cournapeau, D. and Brucher, M. and Perrot, M. and Duchesnay, E. Journal of Machine Learning Research. 12: 2825—2830, 2011

Cook J, Ramadas V. When to consult precision recall curves. The Stata Journal. 2020;20(1):131-148. doi:10.1177/1536867X20909693

Yıldırım, M., Mackie, I. Encouraging users to improve password security and memorability. Int. J. Inf. Secur. 18, 741–759 (2019). https://doi.org/10.1007/s10207-019-00429-y

Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS ’05, pp. 1–12. ACM, New York, NY, USA (2005)

Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma, "Fingerprint Protected Password Authentication Protocol", Security and Communication Networks, vol. 2019, ArticleID 1694702, 12 pages, 2019. https://doi.org/10.1155/2019/1694702

Downloads

Published

2021-02-28

How to Cite

Nakasi, R. ., Yonasi, S. ., & Ngubiri, J. . (2021). Authenticating Passwords by Typing Pattern Biometrics. American Journal of Computing and Engineering, 4(1), 1 - 12. https://doi.org/10.47672/ajce.661

Issue

Section

Articles