Abstract

This study introduces an approach for user authentication using free-text keystroke dynamics which incorporates text in Arabic language. The Arabic language has completely different characteristics to those of English. The approach followed in this study involves the use of the keyboard's key-layout. The method extracts timing features from specific key-pairs in the typed text. Decision trees were exploited to classify each of the users' data. In parallel for comparison, support vector machines were also used for classification in association with an ant colony optimisation feature selection technique. The results obtained from this study are encouraging as low false accept rates and false reject rates were achieved in the experimentation phase. This signifies that satisfactory overall system performance was achieved by using the typing attributes in the proposed approach, while typing Arabic text.

Highlights

  • The ongoing quest to find a technique to protect sensitive data and computer systems from harmful imposters, whilst maintaining ease of use, is an important challenge in the field of information security

  • This study introduces an approach for user authentication using free-text keystroke dynamics which incorporates text in Arabic language

  • The results obtained from this study are encouraging as low false accept rates and false reject rates were achieved in the experimentation phase

Read more

Summary

Introduction

The ongoing quest to find a technique to protect sensitive data and computer systems from harmful imposters, whilst maintaining ease of use, is an important challenge in the field of information security. This paper focuses on a novel method that verifies the identities of users based on their unique typing rhythms in Arabic language. Keystroke dynamics is considered to be an effortless behaviour-based method for user authentication which employs the person’s typing patterns for validating his/her identity. As mentioned in [1], keystroke dynamics is ‘not what you type, but how you type’. In this approach, the user types in text, as usual, without any extra work to be done for authentication. The user types in text, as usual, without any extra work to be done for authentication It only involves the user’s own keyboard and no other external hardware

Methods
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.