Competition between SOM clusters to model user authentication system in computer networks

Shrijit S. Joshi, Vir V. Phoha

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication through keystroke dynamics. Proposed architecture consists of a set of self organizing maps where each user has a distinct map. Each map consists of n neurons in the input layer where n is the length of a keystroke pattern; however to determine the number of neurons in the output layer, a strategy is proposed. For authenticating claimed user, probable user(s) for a given pattern and the degree of similarity between the map of the claimed user and a given pattern are determined. Finally, a decision on the authenticity is made using threshold criteria. Evaluation results show the best false accept rate of 0.88% when false reject rate was 3.55% with authentication accuracy of 97.83%. An application scenario of the method in a computer network environment is also presented.

Original languageEnglish (US)
Title of host publicationProceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007
DOIs
StatePublished - Oct 1 2007
Externally publishedYes
Event2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007 - Bangalore, India
Duration: Jan 7 2007Jan 12 2007

Publication series

NameProceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007

Other

Other2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007
CountryIndia
CityBangalore
Period1/7/071/12/07

Keywords

  • Computer security
  • Keystroke dynamics
  • Self organizing map
  • User authentication

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Competition between SOM clusters to model user authentication system in computer networks'. Together they form a unique fingerprint.

  • Cite this

    Joshi, S. S., & Phoha, V. V. (2007). Competition between SOM clusters to model user authentication system in computer networks. In Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007 [4268064] (Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007). https://doi.org/10.1109/COMSWA.2007.382421