Dynamics User Identification Using Pairwise Client Coupling
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2019, Vol 9, Issue 2
Abstract
In this paper due to the increasing vulnerabilities in the internet, security alone isnt sufficient to keep a rupture, however digital crime scene investigation and cyber intelligence is also required to prevent future assaults or to identify the potential attacker. The unpretentious and incognito nature of biometric information gathering of keystroke dynamics has a high potential for use in cyber forensics or cyber intelligence and crime scene investigation or digital knowledge. The keystroke dynamics is a biometric assumption that different people typify in a unique way. The information accessing from computer systems is normally controlled by client accounts with usernames and passwords. If the set of data falls into the wrong hands, such a scheme has little security. For example fingerprints, can be used to strengthen security, however they require very expensive additional hardware. Keystroke dynamics with no additional hardware can be used. Keystroke dynamics is for the most part applicable to verification and identification also possible. In verification it is known who the client is supposed to be and the biometric system should verify if the user is who he claims to be in identification, the biometric The system should identify the client with keystroke dynamics without additional knowledge. This paper examines the usefulness of keystroke dynamics to determine the users identity. We propose three plans for user identification when entering a keyboard. We use different machine learning algorithms in conjunction with the proposed user coupling technology. In particular, we show that combined user coupling in a bottom - up tree structure scheme provides the best performance in terms of both precision and time complexity. The techniques proposed are validated by keystroke data. Lastly, we also examined the performance of the identification system and demonstrated that the performance was not optimal, as expected.
Authors and Affiliations
Tejaswi D, Rajasekar Rangasamy
Smart Home Implementing IOT Technology with Multilingual Speech Recognition System
There is nothing like staying at home for real comfort. This era is a technical era. People are searching for smart way of doing every little-to-big things in their life.so there is no exception for home at all. We can u...
A Study of Data Storage Security Issues in Cloud Computing
Cloud computing provides on demand services to its purchasers. Knowledge storage is among one in every of the first services provided by cloud computing. Cloud service supplier hosts the information of knowledge owner on...
Enhanced Automatically Mining Facets for Queries and Clustering with Side Information Model
In this paper describe a specific type of summaries that Query facet the main topic of given text. Existing summarization algorithms are classified into different categories in terms of their summary construction methods...
Optimal Testing Resource Allocation Problems in Software System using Heuristic Algorithm
Software Testing is the process of implementing a program with the definite intent of finding errors former to delivery to the end user. Due to the increase and the complexity of the software system the problem is how to...
Synergy of Classical and Model-Based Object-Oriented (OO) Metrics in Reducing Test Costs
Software testing and maintenance being interleaved phases span more in software life cycle. The efforts to minimize this span rely obviously on testing when maintenance is natural. The features of Object-Oriented (OO) so...