Loading...
Please wait, while we are loading the content...
Similar Documents
Evaluating the Reliability of Credential Hardening through Keystroke Dynamics
| Content Provider | CiteSeerX |
|---|---|
| Author | Bartlow, Nick Cukic, Bojan |
| Description | Most computer systems rely on usernames and pass-words as a mechanism for authentication and access con-trol. These credential sets offer weak protection to a broad scope of applications with differing levels of sensitivity. Traditional physiological biometric systems such as finger-print, face, and iris recognition are not readily deployable in remote authentication schemes. Keystroke dynamics pro-vide the ability to combine the ease of use of username / password schemes with the increased trustworthiness asso-ciated with biometrics. Our research extends previous work on keystroke dynamics by incorporating shift-key patterns. The system is capable of operating at various points on a traditional ROC curve depending on application specific se-curity needs. A 1 % False Accept Rate is attainable at a 14% False Reject Rate. An Equal Error Rate of 5 % is suitable for systems requiring a relatively low security. As a username password authentication scheme, our approach decreases the system penetration rate associated with compromised passwords by 95%-99%. Said performance measures can be further improved through optimization of the classifica-tion algorithm on a user specific basis. 1 |
| File Format | |
| Language | English |
| Publisher Institution | in Software Reliability Engineering, 2006. ISSRE ’06. 17th International Symposium on, 2006 |
| Access Restriction | Open |
| Subject Keyword | Username Password Authentication Scheme Equal Error Rate System Penetration Rate Broad Scope Low Security Compromised Password Username Password User Specific Basis Iris Recognition Various Point Computer System Previous Work Classifica-tion Algorithm Traditional Roc Curve Credential Hardening Credential Set Remote Authentication Scheme Application Specific Se-curity Need Shift-key Pattern Access Con-trol Traditional Physiological Biometric System False Accept Rate Weak Protection Keystroke Dynamic False Reject Rate Increased Trustworthiness Said Performance Measure |
| Content Type | Text |
| Resource Type | Article |