A methodology for improving computer access security
A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one o...
Saved in:
| Published in | Computers & security Vol. 12; no. 7; pp. 657 - 662 |
|---|---|
| Main Author | |
| Format | Journal Article |
| Language | English |
| Published |
Amsterdam
Elsevier Ltd
1993
Elsevier Sequoia S.A |
| Subjects | |
| Online Access | Get full text |
| ISSN | 0167-4048 1872-6208 |
| DOI | 10.1016/0167-4048(93)90083-H |
Cover
| Abstract | A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92%
The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics. |
|---|---|
| AbstractList | A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92%
The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics. A computer access verification methodology that uses pattern recognition techniques is presented. The input vectors were made up of the time intervals between successive keystrokes created by users, while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in the study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92%. The application of these algorithms in identifying computer users could lead to more secure computer systems. Work is now under way to apply the the methodology used in the study to multiuser computer systems and network environments. The method is accurate, simple, and easy to implement at little cost. A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time intervals between successive keystrokes created by users while typing a known sequence of characters. Each input vector was classified into one of several classes, thereby identifying the user. Five pattern recognition techniques were used in this study. A 100% classification accuracy was achieved using the potential function algorithm, but this required the longest computing time. The least successful algorithm was the cosine measure, with an accuracy of 92.92%. The application of these algorithms in identifying computer users could lead to more secure computer systems. This method is simple and accurate, with cost-effective characteristics. |
| Author | Obaidat, M.S. |
| Author_xml | – sequence: 1 givenname: M.S. surname: Obaidat fullname: Obaidat, M.S. organization: Department of Electrical Engineering, The City University of New York, The City College, New York, NY 10031, USA |
| BookMark | eNqFkMFKAzEURYNUsK3-gYvBhehiNMnESeJCKEWtUHCj65DJvNaUmUlNMoX-vakVF13o4hF4nHt5OSM06FwHCJ0TfEMwKW_T8JxhJq5kcS0xFkU-O0JDIjjNS4rFAA1_kRM0CmGFMeGlEEPEJlkL8cPVrnHLbbZwPrPt2ruN7ZaZce26j-AzbQyEkAUwvbdxe4qOF7oJcPbzjtH70-PbdJbPX59fppN5bijnMS9rLYVmnJCqklDWFa0pwzUpCINUmNaaMFPRUtSFpoXklOmSsopyyajRVTFGl_vedNBnDyGq1gYDTaM7cH1Q6U9Mck4SeHEArlzvu3SbopgXQhB2l6D7PWS8C8HDQhkbdbSui17bRhGsdjbVTpXaqVKyUN821SyF2UF47W2r_fa_2MM-BknTxoJXwVjoDNTWg4mqdvbvgi9oRI0F |
| CODEN | CPSEDU |
| CitedBy_id | crossref_primary_10_1002_spy2_44 crossref_primary_10_1016_j_dsp_2012_04_012 crossref_primary_10_1016_j_cose_2006_11_006 crossref_primary_10_1109_64_642960 crossref_primary_10_1016_S0140_3664_03_00050_1 crossref_primary_10_1002_sec_119 crossref_primary_10_1109_3477_558812 |
| Cites_doi | 10.1109/TPAMI.1987.4767970 10.1109/19.106309 10.1016/0031-3203(89)90059-9 10.1109/ICPR.1988.28459 10.1109/21.87093 |
| ContentType | Journal Article |
| Copyright | 1993 Copyright Elsevier Sequoia S.A. Nov 1993 |
| Copyright_xml | – notice: 1993 – notice: Copyright Elsevier Sequoia S.A. Nov 1993 |
| DBID | AAYXX CITATION 7SC 8FD JQ2 K7. L7M L~C L~D 7U1 C1K |
| DOI | 10.1016/0167-4048(93)90083-H |
| DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection ProQuest Criminal Justice (Alumni) Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Risk Abstracts Environmental Sciences and Pollution Management |
| DatabaseTitle | CrossRef ProQuest Criminal Justice (Alumni) Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Risk Abstracts Environmental Sciences and Pollution Management |
| DatabaseTitleList | ProQuest Criminal Justice (Alumni) Risk Abstracts |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1872-6208 |
| EndPage | 662 |
| ExternalDocumentID | 1042272 10_1016_0167_4048_93_90083_H 016740489390083H |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD 7SC 8FD AGCQF JQ2 K7. L7M L~C L~D 7U1 C1K |
| ID | FETCH-LOGICAL-c277t-6da98a4711bb9e6db2d240d1314ecce11ba14cb268d3a239724a624b27942cab3 |
| ISSN | 0167-4048 |
| IngestDate | Mon Oct 06 18:07:47 EDT 2025 Mon Jun 30 03:53:55 EDT 2025 Wed Oct 01 04:27:12 EDT 2025 Thu Apr 24 22:59:27 EDT 2025 Fri Feb 23 02:20:17 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | Classification techniques Pattern recognition Computer security Passwords |
| Language | English |
| License | https://www.elsevier.com/tdm/userlicense/1.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c277t-6da98a4711bb9e6db2d240d1314ecce11ba14cb268d3a239724a624b27942cab3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 207388145 |
| PQPubID | 46289 |
| PageCount | 6 |
| ParticipantIDs | proquest_miscellaneous_16749771 proquest_journals_207388145 crossref_citationtrail_10_1016_0167_4048_93_90083_H crossref_primary_10_1016_0167_4048_93_90083_H elsevier_sciencedirect_doi_10_1016_0167_4048_93_90083_H |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 1900 |
| PublicationDate | 1993-00-00 |
| PublicationDateYYYYMMDD | 1993-01-01 |
| PublicationDate_xml | – year: 1993 text: 1993-00-00 |
| PublicationDecade | 1990 |
| PublicationPlace | Amsterdam |
| PublicationPlace_xml | – name: Amsterdam |
| PublicationTitle | Computers & security |
| PublicationYear | 1993 |
| Publisher | Elsevier Ltd Elsevier Sequoia S.A |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier Sequoia S.A |
| References | Plamondon, Lorette (BIB5) 1989; 22 Obaidat, Macchairolo, Bleha (BIB3) 1991 Schalkoff (BIB8) 1992 Tao, Gonzalez (BIB7) 1974 Tappert, Suen, Wakahara (BIB6) 1988 Pao (BIB9) 1989 Almuallim, Yamaguchi (BIB4) September 1987; PAMI-9 Bleha, Obaidat (BIB2) March/April 1991; 21 Obaidat, Ekis (BIB1) October 1991; 40 Obaidat (10.1016/0167-4048(93)90083-H_BIB1) 1991; 40 Tappert (10.1016/0167-4048(93)90083-H_BIB6) 1988 Tao (10.1016/0167-4048(93)90083-H_BIB7) 1974 Almuallim (10.1016/0167-4048(93)90083-H_BIB4) 1987; PAMI-9 Obaidat (10.1016/0167-4048(93)90083-H_BIB3) 1991 Plamondon (10.1016/0167-4048(93)90083-H_BIB5) 1989; 22 Schalkoff (10.1016/0167-4048(93)90083-H_BIB8) 1992 Bleha (10.1016/0167-4048(93)90083-H_BIB2) 1991; 21 Pao (10.1016/0167-4048(93)90083-H_BIB9) 1989 |
| References_xml | – year: 1974 ident: BIB7 article-title: Pattern Recognition Principles – year: 1992 ident: BIB8 article-title: Pattern Recognition – volume: 21 year: March/April 1991 ident: BIB2 article-title: Dimensionality reduction and feature extraction applications in identifying computer users publication-title: IEEE Transactions on Systems, Man and Cybernetics – start-page: 1123 year: 1988 end-page: 1132 ident: BIB6 article-title: On-line handwriting recognition: a survey publication-title: Proceedings of the 9th International Conference on Pattern Recognition – start-page: 953 year: 1991 end-page: 959 ident: BIB3 article-title: An intelligent neural network system for identifying computer users publication-title: Intelligent Engineering Systems through Artificial Neutral Networks – volume: 40 start-page: 847 year: October 1991 end-page: 850 ident: BIB1 article-title: An automated system for characterizing ultrasonic transducers using patternrecognition publication-title: IEEE Transactions on Instrumentation and Measurements – volume: 22 start-page: 107 year: 1989 end-page: 131 ident: BIB5 article-title: Automatic signiture verification and writer identification–the state of the art publication-title: Pattern Recognition – year: 1989 ident: BIB9 article-title: Adaptive Pattern Recognition and Neural Networks – volume: PAMI-9 year: September 1987 ident: BIB4 article-title: A method of recognition of arabic cursive handwriting publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence – volume: PAMI-9 issue: 5 year: 1987 ident: 10.1016/0167-4048(93)90083-H_BIB4 article-title: A method of recognition of arabic cursive handwriting publication-title: IEEE Transactions on Pattern Analysis and Machine Intelligence doi: 10.1109/TPAMI.1987.4767970 – volume: 40 start-page: 847 issue: 5 year: 1991 ident: 10.1016/0167-4048(93)90083-H_BIB1 article-title: An automated system for characterizing ultrasonic transducers using patternrecognition publication-title: IEEE Transactions on Instrumentation and Measurements doi: 10.1109/19.106309 – year: 1989 ident: 10.1016/0167-4048(93)90083-H_BIB9 – year: 1974 ident: 10.1016/0167-4048(93)90083-H_BIB7 – year: 1992 ident: 10.1016/0167-4048(93)90083-H_BIB8 – volume: 22 start-page: 107 issue: 2 year: 1989 ident: 10.1016/0167-4048(93)90083-H_BIB5 article-title: Automatic signiture verification and writer identification–the state of the art publication-title: Pattern Recognition doi: 10.1016/0031-3203(89)90059-9 – start-page: 1123 year: 1988 ident: 10.1016/0167-4048(93)90083-H_BIB6 article-title: On-line handwriting recognition: a survey publication-title: Proceedings of the 9th International Conference on Pattern Recognition doi: 10.1109/ICPR.1988.28459 – start-page: 953 year: 1991 ident: 10.1016/0167-4048(93)90083-H_BIB3 article-title: An intelligent neural network system for identifying computer users – volume: 21 issue: 2 year: 1991 ident: 10.1016/0167-4048(93)90083-H_BIB2 article-title: Dimensionality reduction and feature extraction applications in identifying computer users publication-title: IEEE Transactions on Systems, Man and Cybernetics doi: 10.1109/21.87093 |
| SSID | ssj0017688 |
| Score | 1.4335947 |
| Snippet | A computer access verification methodology that uses pattern recognition techniques is presented in this paper. The input vectors were made up of the time... A computer access verification methodology that uses pattern recognition techniques is presented. The input vectors were made up of the time intervals between... |
| SourceID | proquest crossref elsevier |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 657 |
| SubjectTerms | Access control Classification techniques Computer science Computer security Cybersecurity Methods Passwords Pattern recognition Statistical analysis Studies |
| Title | A methodology for improving computer access security |
| URI | https://dx.doi.org/10.1016/0167-4048(93)90083-H https://www.proquest.com/docview/207388145 https://www.proquest.com/docview/16749771 |
| Volume | 12 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: Elsevier Journals customDbUrl: mediaType: online eissn: 1872-6208 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0017688 issn: 0167-4048 databaseCode: AKRWK dateStart: 19820101 isFulltext: true providerName: Library Specific Holdings |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lj9MwELZK98KFN6IsjxxYCVS5JLbzuiBFsFXFrhaJbUVv1tjxikpsu0vbC7-ecWxnU14LXKLIiaPIMx5_Hs98Q8gLnpWqBsWpyvKYilQpCsbSViaxSk2JZlk1bJ8n2WQm3s_Tea_3phO1tN2okf72y7yS_5EqtqFcbZbsP0i2_Sg24D3KF68oYbz-lYwrXwDa8SjZgMFF6yPQvlzDEJqSiMO1L1TXRaOhpMO6UYCdN6zfVcGiBhfOsfoM5-dQe0dp7dPm-JXTKiSunJrL7WoBw9NR1fUnWtrz2JFdjoyzgUXOaMbiYsdIso4y5B2Llzl-6Z8ssXMKtN9HuGxpq3DtQ8xHJ1erTzhxP_kgx7PjYzk9nE93n_q9imAsZwd8fHFJbc0we7Z-wN85od4ge8z6Y_pkrzr6-OmoPUfCzVTRsrvjb4TkySR73ba9LPkr_1u_Ayc_LNMN9pjeIbf8piGqnAbcJT2zvEduB-lF3j7fJ6KKOgoRoUJErUJEQSEipxBREPcDMhsfTt9OqC-LQTXL8w3NaigLQFCRKFUaWw-sRlhWJzwROB8NNkMitGJZUXNgiDeZgIwJxdD0Mo3z8iHpL1dL84hECKctHx6kCjvrNAXBdaI0jwGgPNN6QHgYD6k9Z7wtXfJFhuBAO4rSjqIsuWxGUU4GhLa9LhxnyjXv52Gopcd9Ds9JVKZreu4HyUg_L9eS4apVFIlIB-R5-xSNpj0Jg6VZbdfSpt7gxid5_Mf---SmC2-1DrcnpL_5ujVPEYJu1DOvZ98B7g2C1A |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+methodology+for+improving+computer+access+security&rft.jtitle=Computers+%26+security&rft.au=Obaidat%2C+Mohammad+S&rft.date=1993&rft.pub=Elsevier+Sequoia+S.A&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=12&rft.issue=7&rft.spage=657&rft_id=info:doi/10.1016%2F0167-4048%2893%2990083-H&rft.externalDBID=NO_FULL_TEXT&rft.externalDocID=1042272 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |