Ijieeb V4 N2 5
Ijieeb V4 N2 5
Abstract — There are multiple numbers of security authorized users [1]. This is done for the purpose of
systems are available to protect your performing trusted communications between parties for
computer/resources. Among them, password based computing applications.
systems are the most commonly used system due to The well-known ID/password (static
its simplicity, applicability and cost effectiveness authentication) is far the most used authentication
But these types of systems have higher sensitivity to method. It is widely used despite its obvious lack of
cyber-attack. Most of the advanced methods for security. This fact is due to the ease of implementation
authentication based on password security encrypt of this solution, and to the instantaneous recognition of
the contents of password before storing or that system by the users that facilitates its deployment
transmitting in the physical domain. But all and acceptance. Increasing the password strength is a
conventional encryption methods are having its own solution to avoid dictionary attacks or to make brute
limitations, generally either in terms of complexity force attacks infeasible [2]. It is generally accepted that
or in terms of efficiency. the length of the password determines the security it
In this paper an enhanced password based provides, however, it is not exactly true: the strength of
security system has been proposed based on user the password is rather related to its entropy. For
typing behavior, which will attempt to identify example, User that chooses a password of 7 characters
authenticity of any user failing to login in first few is said to provide between 16 and 28 bits of entropy.
attempts by analyzing the basic user
behaviors/activities and finally training them The conventional security system can be shown in
through neural network and classifying them as figure - 1 given below.
genuine or intruder.
1. Introduction
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35
30 Enhanced Password Based Security System Based on User Behavior using Neural Networks
which seeks to identify individuals by their typing behavioral types [4]. Biometric technologies are
characteristics [3]. defined as automated methods of verifying or
Conventionally, user authentication is categorized recognizing the identity of a living person based on
into three classes [4]: physiological or behavioral characteristics [5].
Knowledge - based, Physiological characteristics refer to what the person is,
or, in other words, they measure physical parameters of a
Object or Token - based, certain part of the body. Some examples are Fingerprints,
Biometric - based. Hand Geometry, Vein Checking, Iris Scanning, Retinal
Scanning, Facial Recognition, recognition, Signature
The knowledge-based authentication is based on
Recognition, Mouse Dynamics and keystroke
something one knows and is characterized by secrecy.
dynamics, are good examples of this group.
The examples of knowledge-based authenticators are
Keystroke dynamics is considered as a strong
commonly known passwords and PIN codes. The
behavioral Biometric based Authentication system [6]. It
object-based authentication relies on something one
is a process of analyzing the way a user types at a
has and is characterized by possession.
terminal by monitoring the keyboard in order to identify
Behavioral characteristics are related to what a
the users based on habitual typing rhythm patterns.
person does, or how the person uses the body.
Moreover, unlike other biometric systems, which may
Voiceprint, traditional keys to the doors can be
be expensive to implement, keystroke dynamics is almost
assigned to the object-based category. Usually the
free as the only hardware required is the keyboard.
token-based approach is combined with the knowledge-
A person’s identity is checked in the
based approach. An example of this combination is a
verification case. If the user behavior is matched
bankcard with PIN code. In knowledge-based and
with the existing parameters then the login is
object-based approaches, passwords and tokens can be
successful otherwise the login is unsuccessful. If a
forgotten, lost or stolen. There are also usability
person tries number of times then after three
limitations associated with them. For instance,
unsuccessful attempts the system is automatically
managing multiple passwords / PINs, and memorizing
locked [7].
and recalling strong passwords are not easy tasks.
Biometric-based person recognition overcomes the The ultimate level of security can be achieved
above mentioned difficulties of knowledge-based and with the help of keystroke dynamic only if when
object based approaches. The following figure - 2 combine all the parameters/features like key code, two
shows the different classification of user authentication keystroke latencies, three keystroke latencies and key
methods. duration. This approach can be used to improve the
usual login-password authentication when the
password is no more a secret [9].
The remainder of this paper is organized as
follows: Section 2 gives an enhanced method of
password based security system. Section 3 describes
the experimental results. Section 4 presents the
advantages of the proposed system. Conclusion is
given in the final section.
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35
Enhanced Password Based Security System Based on User Behavior using Neural Networks 31
2.1 Password based behavioral characteristics the output. The nodes of the input layer are passive,
meaning they do not modify the data. They receive a
In the behavior keystroke dynamics, behavior single value on their input, and duplicate the value to
of the user password is checked by the system at the their multiple outputs. In comparison, the nodes of the
real time i.e while entering the password. It includes hidden and output layer are active. The values entering
the multiple parameters to check the behavior of the a hidden node are multiplied by weights; a set of
user like total time to enter password, average time predetermined number is stored in the program. The
in all the attempts, latency between two characters, weighted inputs are then added to produce a single
latency between three characters, deviation from the number (output).
original/last attempt password, number of times
Shift/Caps used to enter the uppercase letter, time
between the two passwords attempts, if in first time
behavior of user/person does not match with the
existing behavior/rhythm etc. It is noted that the
behavior of the users are different from one another
while entering the password in real time.
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35
32 Enhanced Password Based Security System Based on User Behavior using Neural Networks
These parameters are forming a hierarchical the password hence an auto- information mechanism
structure to enhance the speed of computation and about intrusion available to right user.
saving the unnecessary involvement of other inner
layer modules associated with this security system.
These layers logically define the types of activity with 3. Experimental results
knowing the contents of password & behavior of
entering the password. Neural network based 3.1 Tools of data collection
authentication is the innermost layer, which is taking
care of contents available with the password as shown Data is collected in real time using Visual Basic
in Figure - 4. 6.0 as a front end and Microsoft Access 2003. This
includes the various logical parameters as received
from the intruders intending to breach our security set-
up.
i. Number of trails.
ii. Length of password.
iii. Time taken to insert the password.
iv. Time taken to reenter the password if in first
attempt password is wrong.
v. Deviations from the first attempt password.
vi. If the password is in the capital letter,
whether Shift is used or not.
vii. If the password is in the capital letter,
whether Caps Lock is used or not.
These parameters can surely help to define the
activity as normal or intrusion users. When intrusion
declared, to protect the resource, security environment
not allow entering the password further. The other Figure 6: Sample of Data Stored regarding Passwords
benefit of this facility is, when the right person will try
to access the resource, system will not permit to enter
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35
Enhanced Password Based Security System Based on User Behavior using Neural Networks 33
The various parameters are shown above in Table1:Defining the Network Parameters
Microsoft Access figure-6 are
Parameter Values
1. Login ID (id.)
Number of Training Data 120
2. Password (pass.)
3. Password Length (passlen). Number of Testing Data 20
4. Total time to enter the password (totaltime).
5. Status means login is done or not (status.) Number of Hidden Layers 2
6. Average time to enter the whole password
Learning Rate 0.3
(avgtime).
7. Time difference between the two passwords if Momentum 0.2
in the first attempt login is not done/successful
(tdiff). Validation Threshold 20
8. Deviation from the current/actual password
Total no of Epochs 500
(st).
9. Length difference from the current/old attempt Error Per Epoch 0.0000375
password (ldiff).
10. Whether a user is genuine or not (geniun). Accuracy 100 %
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35
34 Enhanced Password Based Security System Based on User Behavior using Neural Networks
In the above figure 8, Weka build a model which 10. It is impossible to break the password with
has taken 1.84 seconds, total number of instances are brute force attack because it is depending
taken ‘120’ out of which ‘36’ users are genuine and upon the user behavior and other logical
‘84’ users are not-genuine as shown in Confusion parameters like total time, average time etc.
Matrix.
5. Conclusion
References
[1] D. Shanmugapriya and G. Padmavathi, "A Survey
of Biometric keystroke Dynamics: Approaches,
Figure 9: Data testing in Weka simulator Security and Challenges", (IJCSIS) International
Journal of Computer Science and Information Security,
In the above figure 9, Weka build a model which Vol. 5, No. 1, 2009.
has taken 0.66 seconds, total number of instances are
taken ‘20’ out of which ‘9’ users are genuine and ‘11’ [2]R. Giot, M. El-Abed, C. Rosenberger, "Keystroke
users are not-genuine as shown in Confusion Matrix. Dynamics Authentication for Collaborative Systems"
2009.
4. Advantages of the proposed system
[3] A. Peacock, X. Ke and M. Wilkerson, “Typing
In summary the security system given in this paper patterns: A key to user Identification”, IEEE Security
having advantages like: - and Privacy 2(5) (2004).
1. Simple & similar design like conventional [4] L. O’Gorman, “Comparing Passwords, Tokens, and
system. Biometrics for User Authentication”, Proceedings of
2. Easy to implement. the IEEE, Vol. 91, No. 12, Dec, pp. 2019-2040, 2003.
3. No extra hardware required.
4. Free from service provider faith ness [5] A. K. Jain, A. Ross and S. Prabhakar, “An
circumference. Introduction to Biometric Recognition”, IEEE
5. It provides intrusion detection facility. Transactions on Circuits and Systems for Video
6. Hierarchical protection gives optimum use of Technology, Special Issue on Image- and Video-Based
security model with high processing speed. Biometrics, Vol. 14, No. 1, January 2004.
7. It provides multi-user facility from same
security environment. [6] A. Awad, E. Ahmed, and I. Traore, “Anomaly
8. Can be used /implemented in wide range of Intrusion Detection based on Biometrics”, Proceedings
applications i.e. for standalone computers, of the IEEE, 2005.
Network systems and/or online systems etc.
9. Account can be protected by allocating the [7] M. K. Singh, "Password Based a Generalize Robust
maximum number of attempts/trials to the Security System design using Neural Network", IJCSI
user by locking the account, when login to International Journal of Computer Science Issues, Vol.
account is un-successful. Hence, provides 4, No. 2, 2009
better security.
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35
Enhanced Password Based Security System Based on User Behavior using Neural Networks 35
Copyright © 2012 MECS I.J. Information Engineering and Electronic Business, 2012, 2, 29-35