Dynamics User Identification Using Pairwise Client Coupling
Journal Title: Bonfring International Journal of Software Engineering and Soft Computing - Year 2019, Vol 9, Issue 2
Abstract
In this paper due to the increasing vulnerabilities in the internet, security alone isnt sufficient to keep a rupture, however digital crime scene investigation and cyber intelligence is also required to prevent future assaults or to identify the potential attacker. The unpretentious and incognito nature of biometric information gathering of keystroke dynamics has a high potential for use in cyber forensics or cyber intelligence and crime scene investigation or digital knowledge. The keystroke dynamics is a biometric assumption that different people typify in a unique way. The information accessing from computer systems is normally controlled by client accounts with usernames and passwords. If the set of data falls into the wrong hands, such a scheme has little security. For example fingerprints, can be used to strengthen security, however they require very expensive additional hardware. Keystroke dynamics with no additional hardware can be used. Keystroke dynamics is for the most part applicable to verification and identification also possible. In verification it is known who the client is supposed to be and the biometric system should verify if the user is who he claims to be in identification, the biometric The system should identify the client with keystroke dynamics without additional knowledge. This paper examines the usefulness of keystroke dynamics to determine the users identity. We propose three plans for user identification when entering a keyboard. We use different machine learning algorithms in conjunction with the proposed user coupling technology. In particular, we show that combined user coupling in a bottom - up tree structure scheme provides the best performance in terms of both precision and time complexity. The techniques proposed are validated by keystroke data. Lastly, we also examined the performance of the identification system and demonstrated that the performance was not optimal, as expected.
Authors and Affiliations
Tejaswi D, Rajasekar Rangasamy
Android Application Development for Textile Industry
The main motivation for the application development for textile industries is fashion cycles are developing faster than ever. The current world is enclosed with a large number of digital visual information. Sample approv...
Enhanced Scalable Learning for Identifying and Ranking for Big Data Using Social Media Factors
In this paper describe a valuable information from online sources has become a prominent research area in information technology in recent years. In recent period, social media services provide a vast amount of user-gene...
Security Enhancement and Time Delay Consumption for Cloud Computing Using AES and RC6 Algorithm
Cloud computing is an Internet based computing. It provides the services to the organizations like storage, applications and servers. In cloud storage User can store their data remotely without maintaining local copy of...
Assessment of Rainfall and Temperature using OSA Estimators of Extreme Value Distributions
Estimation of rainfall and temperature for a desired return period is one of the pre-requisite for planning, design and management of the civil structures at the project site. This paper illustrates the use of extreme va...
Enhanced Automatically Mining Facets for Queries and Clustering with Side Information Model
In this paper describe a specific type of summaries that Query facet the main topic of given text. Existing summarization algorithms are classified into different categories in terms of their summary construction methods...