Computer-access authentication with neural network based keystroke identity verification

This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for each user and forms the patterns of keyboard dynamics. A three-layered backpropagation neural network with a flexible number of input nodes was...

Full description

Saved in:
Bibliographic Details
Published in1997 IEEE International Conference on Neural Networks Vol. 1; pp. 174 - 178 vol.1
Main Author Daw-Tung Lin
Format Conference Proceeding
LanguageEnglish
Published IEEE 1997
Subjects
Online AccessGet full text
ISBN0780341228
9780780341227
DOI10.1109/ICNN.1997.611659

Cover

Abstract This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for each user and forms the patterns of keyboard dynamics. A three-layered backpropagation neural network with a flexible number of input nodes was used to discriminate valid users and impostors according to each individual's password keystroke pattern. System verification performance was improved by setting convergence criteria RMSE to a smaller threshold value during training procedure. The resulting system gave an 1.1% FAR (false alarm rate) in rejecting valid users and zero IPR (impostor pass rate) in accepting no impostors. The performance of the proposed identification method is superior to that of previous studies. A suitable network structure for this application was also discussed. Furthermore, the implementation of this approach requires no special hardware and is easy to be integrated with most computer systems.
AbstractList This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for each user and forms the patterns of keyboard dynamics. A three-layered backpropagation neural network with a flexible number of input nodes was used to discriminate valid users and impostors according to each individual's password keystroke pattern. System verification performance was improved by setting convergence criteria RMSE to a smaller threshold value during training procedure. The resulting system gave an 1.1% FAR (false alarm rate) in rejecting valid users and zero IPR (impostor pass rate) in accepting no impostors. The performance of the proposed identification method is superior to that of previous studies. A suitable network structure for this application was also discussed. Furthermore, the implementation of this approach requires no special hardware and is easy to be integrated with most computer systems.
Author Daw-Tung Lin
Author_xml – sequence: 1
  surname: Daw-Tung Lin
  fullname: Daw-Tung Lin
  organization: Dept. of Comput. Sci., Chung-Hua Polytech. Inst., Hsinchu, Taiwan
BookMark eNotj8tqwzAURAVtoU2afelKP2BXL1vSspg-AiHdJNBdkOUrojqxgyQ3-O_rkszmMIszMDN02_UdIPRESU4p0S_Lar3OqdYyLyktC32DZkQqwgVlTN2jRYw_ZIoohC71A_qu-uNpSBAyYy3EiM2Q9tAlb03yfYfPPu1xB0Mwhwnp3IcW1yZCg1sYYwp9C9g3_0Ia8S8E767mI7pz5hBhceUcbd_fNtVntvr6WFavq8xTyVLGQDimyrIgmghWN6IGqYyxToBlDSHSSi0dNFOpFWW1UAKY5JwUWgmqHZ-j58uuB4DdKfijCePu8p3_AcftU08
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICNN.1997.611659
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Xplore Digital Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EndPage 178 vol.1
ExternalDocumentID 611659
GroupedDBID 6IE
6IK
6IL
AAJGR
AAWTH
ACGHX
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
OCL
RIE
RIL
ID FETCH-LOGICAL-i172t-2e4f2866509042bd4be78aacf4ec2d007c797fedc2db812b484e27330598419f3
IEDL.DBID RIE
ISBN 0780341228
9780780341227
IngestDate Tue Aug 26 18:26:10 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i172t-2e4f2866509042bd4be78aacf4ec2d007c797fedc2db812b484e27330598419f3
ParticipantIDs ieee_primary_611659
PublicationCentury 1900
PublicationDate 19970000
PublicationDateYYYYMMDD 1997-01-01
PublicationDate_xml – year: 1997
  text: 19970000
PublicationDecade 1990
PublicationTitle 1997 IEEE International Conference on Neural Networks
PublicationTitleAbbrev ICNN
PublicationYear 1997
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000454969
Score 1.342475
Snippet This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for...
SourceID ieee
SourceType Publisher
StartPage 174
SubjectTerms Application software
Authentication
Backpropagation
Computer networks
Computer security
Convergence
Delay
Intellectual property
Keyboards
Neural networks
Title Computer-access authentication with neural network based keystroke identity verification
URI https://ieeexplore.ieee.org/document/611659
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09a8MwEBVNpk79Suk3GrrK8YciS3NoSAsNHRrIFiT5DCHFKYkztL--d7KT0tKhky2DhZGQ3vPp3jvG7hHz88KaRCReKSGVjoXOnBRGWgQXyAY6I73z80SNp_JpNpi1PttBCwMAIfkMIroNZ_nFym8pVNZX5BVjOqyTa9VItfbhFHKSM8qEH3Md49acprr119m1890pZWz6j8PJhIR6edT0-aO2SoCW0VGj2d4ER0LKKFlG29pF_vOXX-M_v_qY9b41fPxlj04n7ACqMzbbFXEQNhRK5JYS3Ku6Ddxxispysri0b3gJCeKccK7guNY39Xq1BL5opL0fHBcB5RmFN3tsOnp4HY5FW1tBLJCy1CIFWabkdRcbXLaukA5yba0vJfi0QOLgc5OXUGDDIQdwUktApoO7g9EyMWV2zrrVqoILxgceKWGmbZJ6JSHWSDixr8KZMhmA0_aSndKgzN8b-4x5Mx5Xfz69ZoeNPyzFOG5Yt15v4RZRv3Z3Yb6_AISvqi8
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDDDxKuKNB1aneTiJPVdULbQRQyt1q2znIlVFKWrTAX49ZyctAjEwxY4UK7J1vs_n-74j5BF9fporGbDAJAnjifCZiDRnkit0LhDFIrJ851GW9Cf8eRpPG51tx4UBAJd8Bp5turv8fGk2NlTWSaxWjNwnBzHnPK7JWruAitWSk4l0R3Ph4-YchqJR2Nn20-09pS87g26WWape6tWj_qiu4pxL77hmba-dJqHNKVl4m0p75vOXYuM___uEtL9ZfPR1559OyR6U52S6LePAlCuVSJVNcS-rJnRHbVyWWpFL9YYPlyJOrafLKVr7ulotF0DnNbn3g6IZ2Ewj92WbTHpP426fNdUV2BxBS8VC4EVo1e58iYarc64hFUqZgoMJc4QOJpVpATl2NKIAzQUHxDq4P0jBA1lEF6RVLku4JDQ2CAojoYLQJBx8gZATx8q1LIIYtFBX5MxOyuy9FtCY1fNx_efbB3LYH4-Gs-Ege7khR7VarI143JJWtdrAHWKASt-7tf8CngWtfA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=1997+IEEE+International+Conference+on+Neural+Networks&rft.atitle=Computer-access+authentication+with+neural+network+based+keystroke+identity+verification&rft.au=Daw-Tung+Lin&rft.date=1997-01-01&rft.pub=IEEE&rft.isbn=9780780341227&rft.volume=1&rft.spage=174&rft.epage=178+vol.1&rft_id=info:doi/10.1109%2FICNN.1997.611659&rft.externalDocID=611659
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780341227/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780341227/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780341227/sc.gif&client=summon&freeimage=true