A methodology for improving computer access security

A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one o...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 12; no. 7; pp. 657 - 662
Main Author Obaidat, M.S.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier Ltd 1993
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0167-4048
1872-6208
DOI10.1016/0167-4048(93)90083-H

Cover

More Information
Summary:A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92% The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
ISSN:0167-4048
1872-6208
DOI:10.1016/0167-4048(93)90083-H