Computer-access authentication with neural network based keystroke identity verification
This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for each user and forms the patterns of keyboard dynamics. A three-layered backpropagation neural network with a flexible number of input nodes was...
        Saved in:
      
    
          | Published in | 1997 IEEE International Conference on Neural Networks Vol. 1; pp. 174 - 178 vol.1 | 
|---|---|
| Main Author | |
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        1997
     | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 0780341228 9780780341227  | 
| DOI | 10.1109/ICNN.1997.611659 | 
Cover
| Abstract | This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for each user and forms the patterns of keyboard dynamics. A three-layered backpropagation neural network with a flexible number of input nodes was used to discriminate valid users and impostors according to each individual's password keystroke pattern. System verification performance was improved by setting convergence criteria RMSE to a smaller threshold value during training procedure. The resulting system gave an 1.1% FAR (false alarm rate) in rejecting valid users and zero IPR (impostor pass rate) in accepting no impostors. The performance of the proposed identification method is superior to that of previous studies. A suitable network structure for this application was also discussed. Furthermore, the implementation of this approach requires no special hardware and is easy to be integrated with most computer systems. | 
    
|---|---|
| AbstractList | This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for each user and forms the patterns of keyboard dynamics. A three-layered backpropagation neural network with a flexible number of input nodes was used to discriminate valid users and impostors according to each individual's password keystroke pattern. System verification performance was improved by setting convergence criteria RMSE to a smaller threshold value during training procedure. The resulting system gave an 1.1% FAR (false alarm rate) in rejecting valid users and zero IPR (impostor pass rate) in accepting no impostors. The performance of the proposed identification method is superior to that of previous studies. A suitable network structure for this application was also discussed. Furthermore, the implementation of this approach requires no special hardware and is easy to be integrated with most computer systems. | 
    
| Author | Daw-Tung Lin | 
    
| Author_xml | – sequence: 1 surname: Daw-Tung Lin fullname: Daw-Tung Lin organization: Dept. of Comput. Sci., Chung-Hua Polytech. Inst., Hsinchu, Taiwan  | 
    
| BookMark | eNotj8tqwzAURAVtoU2afelKP2BXL1vSspg-AiHdJNBdkOUrojqxgyQ3-O_rkszmMIszMDN02_UdIPRESU4p0S_Lar3OqdYyLyktC32DZkQqwgVlTN2jRYw_ZIoohC71A_qu-uNpSBAyYy3EiM2Q9tAlb03yfYfPPu1xB0Mwhwnp3IcW1yZCg1sYYwp9C9g3_0Ia8S8E767mI7pz5hBhceUcbd_fNtVntvr6WFavq8xTyVLGQDimyrIgmghWN6IGqYyxToBlDSHSSi0dNFOpFWW1UAKY5JwUWgmqHZ-j58uuB4DdKfijCePu8p3_AcftU08 | 
    
| ContentType | Conference Proceeding | 
    
| DBID | 6IE 6IL CBEJK RIE RIL  | 
    
| DOI | 10.1109/ICNN.1997.611659 | 
    
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Xplore Digital Library IEEE Proceedings Order Plans (POP All) 1998-Present  | 
    
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| EndPage | 178 vol.1 | 
    
| ExternalDocumentID | 611659 | 
    
| GroupedDBID | 6IE 6IK 6IL AAJGR AAWTH ACGHX ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK OCL RIE RIL  | 
    
| ID | FETCH-LOGICAL-i172t-2e4f2866509042bd4be78aacf4ec2d007c797fedc2db812b484e27330598419f3 | 
    
| IEDL.DBID | RIE | 
    
| ISBN | 0780341228 9780780341227  | 
    
| IngestDate | Tue Aug 26 18:26:10 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-i172t-2e4f2866509042bd4be78aacf4ec2d007c797fedc2db812b484e27330598419f3 | 
    
| ParticipantIDs | ieee_primary_611659 | 
    
| PublicationCentury | 1900 | 
    
| PublicationDate | 19970000 | 
    
| PublicationDateYYYYMMDD | 1997-01-01 | 
    
| PublicationDate_xml | – year: 1997 text: 19970000  | 
    
| PublicationDecade | 1990 | 
    
| PublicationTitle | 1997 IEEE International Conference on Neural Networks | 
    
| PublicationTitleAbbrev | ICNN | 
    
| PublicationYear | 1997 | 
    
| Publisher | IEEE | 
    
| Publisher_xml | – name: IEEE | 
    
| SSID | ssj0000454969 | 
    
| Score | 1.342475 | 
    
| Snippet | This paper presents a novel application of neural nets to user identity authentication on computer-access security system. Keystroke latency is measured for... | 
    
| SourceID | ieee | 
    
| SourceType | Publisher | 
    
| StartPage | 174 | 
    
| SubjectTerms | Application software Authentication Backpropagation Computer networks Computer security Convergence Delay Intellectual property Keyboards Neural networks  | 
    
| Title | Computer-access authentication with neural network based keystroke identity verification | 
    
| URI | https://ieeexplore.ieee.org/document/611659 | 
    
| Volume | 1 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09a8MwEBVNpk79Suk3GrrK8YciS3NoSAsNHRrIFiT5DCHFKYkztL--d7KT0tKhky2DhZGQ3vPp3jvG7hHz88KaRCReKSGVjoXOnBRGWgQXyAY6I73z80SNp_JpNpi1PttBCwMAIfkMIroNZ_nFym8pVNZX5BVjOqyTa9VItfbhFHKSM8qEH3Md49acprr119m1890pZWz6j8PJhIR6edT0-aO2SoCW0VGj2d4ER0LKKFlG29pF_vOXX-M_v_qY9b41fPxlj04n7ACqMzbbFXEQNhRK5JYS3Ku6Ddxxispysri0b3gJCeKccK7guNY39Xq1BL5opL0fHBcB5RmFN3tsOnp4HY5FW1tBLJCy1CIFWabkdRcbXLaukA5yba0vJfi0QOLgc5OXUGDDIQdwUktApoO7g9EyMWV2zrrVqoILxgceKWGmbZJ6JSHWSDixr8KZMhmA0_aSndKgzN8b-4x5Mx5Xfz69ZoeNPyzFOG5Yt15v4RZRv3Z3Yb6_AISvqi8 | 
    
| linkProvider | IEEE | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELagDDDxKuKNB1aneTiJPVdULbQRQyt1q2znIlVFKWrTAX49ZyctAjEwxY4UK7J1vs_n-74j5BF9fporGbDAJAnjifCZiDRnkit0LhDFIrJ851GW9Cf8eRpPG51tx4UBAJd8Bp5turv8fGk2NlTWSaxWjNwnBzHnPK7JWruAitWSk4l0R3Ph4-YchqJR2Nn20-09pS87g26WWape6tWj_qiu4pxL77hmba-dJqHNKVl4m0p75vOXYuM___uEtL9ZfPR1559OyR6U52S6LePAlCuVSJVNcS-rJnRHbVyWWpFL9YYPlyJOrafLKVr7ulotF0DnNbn3g6IZ2Ewj92WbTHpP426fNdUV2BxBS8VC4EVo1e58iYarc64hFUqZgoMJc4QOJpVpATl2NKIAzQUHxDq4P0jBA1lEF6RVLku4JDQ2CAojoYLQJBx8gZATx8q1LIIYtFBX5MxOyuy9FtCY1fNx_efbB3LYH4-Gs-Ege7khR7VarI143JJWtdrAHWKASt-7tf8CngWtfA | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=1997+IEEE+International+Conference+on+Neural+Networks&rft.atitle=Computer-access+authentication+with+neural+network+based+keystroke+identity+verification&rft.au=Daw-Tung+Lin&rft.date=1997-01-01&rft.pub=IEEE&rft.isbn=9780780341227&rft.volume=1&rft.spage=174&rft.epage=178+vol.1&rft_id=info:doi/10.1109%2FICNN.1997.611659&rft.externalDocID=611659 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780341227/lc.gif&client=summon&freeimage=true | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780341227/mc.gif&client=summon&freeimage=true | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9780780341227/sc.gif&client=summon&freeimage=true |