A methodology for improving computer access security

A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one o...

Full description

Saved in:
Bibliographic Details
Published inComputers & security Vol. 12; no. 7; pp. 657 - 662
Main Author Obaidat, M.S.
Format Journal Article
LanguageEnglish
Published Amsterdam Elsevier Ltd 1993
Elsevier Sequoia S.A
Subjects
Online AccessGet full text
ISSN0167-4048
1872-6208
DOI10.1016/0167-4048(93)90083-H

Cover

Abstract A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92% The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics.
AbstractList A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92% The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics.
A computer access verification methodology that uses pattern recognition techniques is presented. The input vectors were made up of the time intervals between successive keystrokes created by users, while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in the study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92%. The application of these algorithms in identifying computer users could lead to more secure computer systems. Work is now under way to apply the the methodology used in the study to multiuser computer systems and network environments. The method is accurate, simple, and easy to implement at little cost.
A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92%. The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics.
Author Obaidat, M.S.
Author_xml – sequence: 1
  givenname: M.S.
  surname: Obaidat
  fullname: Obaidat, M.S.
  organization: Department of Electrical Engineering, The City University of New York, The City College, New York, NY 10031, USA
BookMark eNqFkMFKAzEURYNUsK3-gYvBhehiNMnESeJCKEWtUHCj65DJvNaUmUlNMoX-vakVF13o4hF4nHt5OSM06FwHCJ0TfEMwKW_T8JxhJq5kcS0xFkU-O0JDIjjNS4rFAA1_kRM0CmGFMeGlEEPEJlkL8cPVrnHLbbZwPrPt2ruN7ZaZce26j-AzbQyEkAUwvbdxe4qOF7oJcPbzjtH70-PbdJbPX59fppN5bijnMS9rLYVmnJCqklDWFa0pwzUpCINUmNaaMFPRUtSFpoXklOmSsopyyajRVTFGl_vedNBnDyGq1gYDTaM7cH1Q6U9Mck4SeHEArlzvu3SbopgXQhB2l6D7PWS8C8HDQhkbdbSui17bRhGsdjbVTpXaqVKyUN821SyF2UF47W2r_fa_2MM-BknTxoJXwVjoDNTWg4mqdvbvgi9oRI0F
CODEN CPSEDU
CitedBy_id crossref_primary_10_1002_spy2_44
crossref_primary_10_1016_j_dsp_2012_04_012
crossref_primary_10_1016_j_cose_2006_11_006
crossref_primary_10_1109_64_642960
crossref_primary_10_1016_S0140_3664_03_00050_1
crossref_primary_10_1002_sec_119
crossref_primary_10_1109_3477_558812
Cites_doi 10.1109/TPAMI.1987.4767970
10.1109/19.106309
10.1016/0031-3203(89)90059-9
10.1109/ICPR.1988.28459
10.1109/21.87093
ContentType Journal Article
Copyright 1993
Copyright Elsevier Sequoia S.A. Nov 1993
Copyright_xml – notice: 1993
– notice: Copyright Elsevier Sequoia S.A. Nov 1993
DBID AAYXX
CITATION
7SC
8FD
JQ2
K7.
L7M
L~C
L~D
7U1
C1K
DOI 10.1016/0167-4048(93)90083-H
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
ProQuest Criminal Justice (Alumni)
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Risk Abstracts
Environmental Sciences and Pollution Management
DatabaseTitle CrossRef
ProQuest Criminal Justice (Alumni)
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Risk Abstracts
Environmental Sciences and Pollution Management
DatabaseTitleList
ProQuest Criminal Justice (Alumni)
Risk Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1872-6208
EndPage 662
ExternalDocumentID 1042272
10_1016_0167_4048_93_90083_H
016740489390083H
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1RT
1~.
1~5
29F
4.4
457
4G.
5GY
5VS
7-5
71M
8P~
9JN
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AAXUO
AAYFN
ABBOA
ABFSI
ABMAC
ABXDB
ABYKQ
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADHUB
ADJOM
ADMUD
AEBSH
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ASPBG
AVWKF
AXJTR
AZFZN
BKOJK
BKOMP
BLXMC
CS3
DU5
E.L
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
GBOLZ
HLX
HLZ
HVGLF
HZ~
IHE
J1W
KOM
LG8
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
PQQKQ
Q38
R2-
RIG
RNS
ROL
RPZ
RXW
SBC
SBM
SDF
SDG
SDP
SES
SEW
SPC
SPCBC
SSV
SSZ
T5K
TAE
TN5
TWZ
WH7
WUQ
XJE
XPP
XSW
YK3
ZMT
~G-
AATTM
AAXKI
AAYWO
AAYXX
ABJNI
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
7SC
8FD
AGCQF
JQ2
K7.
L7M
L~C
L~D
7U1
C1K
ID FETCH-LOGICAL-c277t-6da98a4711bb9e6db2d240d1314ecce11ba14cb268d3a239724a624b27942cab3
ISSN 0167-4048
IngestDate Mon Oct 06 18:07:47 EDT 2025
Mon Jun 30 03:53:55 EDT 2025
Wed Oct 01 04:27:12 EDT 2025
Thu Apr 24 22:59:27 EDT 2025
Fri Feb 23 02:20:17 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords Classification techniques
Pattern recognition
Computer security
Passwords
Language English
License https://www.elsevier.com/tdm/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c277t-6da98a4711bb9e6db2d240d1314ecce11ba14cb268d3a239724a624b27942cab3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 207388145
PQPubID 46289
PageCount 6
ParticipantIDs proquest_miscellaneous_16749771
proquest_journals_207388145
crossref_citationtrail_10_1016_0167_4048_93_90083_H
crossref_primary_10_1016_0167_4048_93_90083_H
elsevier_sciencedirect_doi_10_1016_0167_4048_93_90083_H
ProviderPackageCode CITATION
AAYXX
PublicationCentury 1900
PublicationDate 1993-00-00
PublicationDateYYYYMMDD 1993-01-01
PublicationDate_xml – year: 1993
  text: 1993-00-00
PublicationDecade 1990
PublicationPlace Amsterdam
PublicationPlace_xml – name: Amsterdam
PublicationTitle Computers & security
PublicationYear 1993
Publisher Elsevier Ltd
Elsevier Sequoia S.A
Publisher_xml – name: Elsevier Ltd
– name: Elsevier Sequoia S.A
References Plamondon, Lorette (BIB5) 1989; 22
Obaidat, Macchairolo, Bleha (BIB3) 1991
Schalkoff (BIB8) 1992
Tao, Gonzalez (BIB7) 1974
Tappert, Suen, Wakahara (BIB6) 1988
Pao (BIB9) 1989
Almuallim, Yamaguchi (BIB4) September 1987; PAMI-9
Bleha, Obaidat (BIB2) March/April 1991; 21
Obaidat, Ekis (BIB1) October 1991; 40
Obaidat (10.1016/0167-4048(93)90083-H_BIB1) 1991; 40
Tappert (10.1016/0167-4048(93)90083-H_BIB6) 1988
Tao (10.1016/0167-4048(93)90083-H_BIB7) 1974
Almuallim (10.1016/0167-4048(93)90083-H_BIB4) 1987; PAMI-9
Obaidat (10.1016/0167-4048(93)90083-H_BIB3) 1991
Plamondon (10.1016/0167-4048(93)90083-H_BIB5) 1989; 22
Schalkoff (10.1016/0167-4048(93)90083-H_BIB8) 1992
Bleha (10.1016/0167-4048(93)90083-H_BIB2) 1991; 21
Pao (10.1016/0167-4048(93)90083-H_BIB9) 1989
References_xml – year: 1974
  ident: BIB7
  article-title: Pattern Recognition Principles
– year: 1992
  ident: BIB8
  article-title: Pattern Recognition
– volume: 21
  year: March/April 1991
  ident: BIB2
  article-title: Dimensionality reduction and feature extraction applications in identifying computer users
  publication-title: IEEE Transactions on Systems, Man and Cybernetics
– start-page: 1123
  year: 1988
  end-page: 1132
  ident: BIB6
  article-title: On-line handwriting recognition: a survey
  publication-title: Proceedings of the 9th International Conference on Pattern Recognition
– start-page: 953
  year: 1991
  end-page: 959
  ident: BIB3
  article-title: An intelligent neural network system for identifying computer users
  publication-title: Intelligent Engineering Systems through Artificial Neutral Networks
– volume: 40
  start-page: 847
  year: October 1991
  end-page: 850
  ident: BIB1
  article-title: An automated system for characterizing ultrasonic transducers using patternrecognition
  publication-title: IEEE Transactions on Instrumentation and Measurements
– volume: 22
  start-page: 107
  year: 1989
  end-page: 131
  ident: BIB5
  article-title: Automatic signiture verification and writer identification–the state of the art
  publication-title: Pattern Recognition
– year: 1989
  ident: BIB9
  article-title: Adaptive Pattern Recognition and Neural Networks
– volume: PAMI-9
  year: September 1987
  ident: BIB4
  article-title: A method of recognition of arabic cursive handwriting
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
– volume: PAMI-9
  issue: 5
  year: 1987
  ident: 10.1016/0167-4048(93)90083-H_BIB4
  article-title: A method of recognition of arabic cursive handwriting
  publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence
  doi: 10.1109/TPAMI.1987.4767970
– volume: 40
  start-page: 847
  issue: 5
  year: 1991
  ident: 10.1016/0167-4048(93)90083-H_BIB1
  article-title: An automated system for characterizing ultrasonic transducers using patternrecognition
  publication-title: IEEE Transactions on Instrumentation and Measurements
  doi: 10.1109/19.106309
– year: 1989
  ident: 10.1016/0167-4048(93)90083-H_BIB9
– year: 1974
  ident: 10.1016/0167-4048(93)90083-H_BIB7
– year: 1992
  ident: 10.1016/0167-4048(93)90083-H_BIB8
– volume: 22
  start-page: 107
  issue: 2
  year: 1989
  ident: 10.1016/0167-4048(93)90083-H_BIB5
  article-title: Automatic signiture verification and writer identification–the state of the art
  publication-title: Pattern Recognition
  doi: 10.1016/0031-3203(89)90059-9
– start-page: 1123
  year: 1988
  ident: 10.1016/0167-4048(93)90083-H_BIB6
  article-title: On-line handwriting recognition: a survey
  publication-title: Proceedings of the 9th International Conference on Pattern Recognition
  doi: 10.1109/ICPR.1988.28459
– start-page: 953
  year: 1991
  ident: 10.1016/0167-4048(93)90083-H_BIB3
  article-title: An intelligent neural network system for identifying computer users
– volume: 21
  issue: 2
  year: 1991
  ident: 10.1016/0167-4048(93)90083-H_BIB2
  article-title: Dimensionality reduction and feature extraction applications in identifying computer users
  publication-title: IEEE Transactions on Systems, Man and Cybernetics
  doi: 10.1109/21.87093
SSID ssj0017688
Score 1.4335947
Snippet A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time...
A computer access verification methodology that uses pattern recognition techniques is presented. The input vectors were made up of the time intervals between...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 657
SubjectTerms Access control
Classification techniques
Computer science
Computer security
Cybersecurity
Methods
Passwords
Pattern recognition
Statistical analysis
Studies
Title A methodology for improving computer access security
URI https://dx.doi.org/10.1016/0167-4048(93)90083-H
https://www.proquest.com/docview/207388145
https://www.proquest.com/docview/16749771
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: Elsevier Journals
  customDbUrl:
  mediaType: online
  eissn: 1872-6208
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssj0017688
  issn: 0167-4048
  databaseCode: AKRWK
  dateStart: 19820101
  isFulltext: true
  providerName: Library Specific Holdings
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZK98KFN6IsjxxYCVS5JLbzuiBFsFXFrhaJbUVv1tjxikpsu0vbC7-ecWxnU14LXKLIiaPIMx5_Hs98Q8gLnpWqBsWpyvKYilQpCsbSViaxSk2JZlk1bJ8n2WQm3s_Tea_3phO1tN2okf72y7yS_5EqtqFcbZbsP0i2_Sg24D3KF68oYbz-lYwrXwDa8SjZgMFF6yPQvlzDEJqSiMO1L1TXRaOhpMO6UYCdN6zfVcGiBhfOsfoM5-dQe0dp7dPm-JXTKiSunJrL7WoBw9NR1fUnWtrz2JFdjoyzgUXOaMbiYsdIso4y5B2Llzl-6Z8ssXMKtN9HuGxpq3DtQ8xHJ1erTzhxP_kgx7PjYzk9nE93n_q9imAsZwd8fHFJbc0we7Z-wN85od4ge8z6Y_pkrzr6-OmoPUfCzVTRsrvjb4TkySR73ba9LPkr_1u_Ayc_LNMN9pjeIbf8piGqnAbcJT2zvEduB-lF3j7fJ6KKOgoRoUJErUJEQSEipxBREPcDMhsfTt9OqC-LQTXL8w3NaigLQFCRKFUaWw-sRlhWJzwROB8NNkMitGJZUXNgiDeZgIwJxdD0Mo3z8iHpL1dL84hECKctHx6kCjvrNAXBdaI0jwGgPNN6QHgYD6k9Z7wtXfJFhuBAO4rSjqIsuWxGUU4GhLa9LhxnyjXv52Gopcd9Ds9JVKZreu4HyUg_L9eS4apVFIlIB-R5-xSNpj0Jg6VZbdfSpt7gxid5_Mf---SmC2-1DrcnpL_5ujVPEYJu1DOvZ98B7g2C1A
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+methodology+for+improving+computer+access+security&rft.jtitle=Computers+%26+security&rft.au=Obaidat%2C+Mohammad+S&rft.date=1993&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=12&rft.issue=7&rft.spage=657&rft_id=info:doi/10.1016%2F0167-4048%2893%2990083-H&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=1042272
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon