Abstract
This paper presents a methodology for the reinforcement of password authentication with the use of typing biometrical mechanisms. Typing biometrics refers to the analysis of keystroke patterns, which is unique for each user. The analysis of these keystroke patterns is done transparently, without being noticeable to the user, while he/she tries to gain system access via a password authentication mechanism in the normal way, i.e. by entering a user identification and password string. The analysis of keystroke patterns is done with fuzzy logic techniques, which are shown to have great potential in uniquely categorising each user ’s unique typing patterns. Fuzzy logic techniques have proven to be very successful in a wide range of applications, with much commercial success. It is shown that the integration of fuzzy logic based typing biometrics into currently employed password mechanisms, which is the most commonly used authentication device, can only serve to enhance security.
Chapter PDF
Similar content being viewed by others
Keywords
References
Jobusch D.L., Oldehoeft A.E., “A survey of Password Mechanisms: Weaknesses and Potential Improvements. Part 1”, Computers & Security, 8 (1989) pp. 587–604
Jobusch D.L., Oldehoeft A.E., “A survey of Password Mechanisms.Weaknesses and Potential Improvements. Part 2”, Computers & Security 8(1989) pp. pp. 675–689
Oxford Concise Dictionary Oxford, Clarendon Press Oxford, 1990
Pfleeger C.P. Security in Computing, Prentice Hall, Englewood Cliffs, 1993
Spender J.C., “Identifying Computer Users with Authentication Devices (Tokens)”, Computers & Security, 6 (1987), pp. 385–395
Conn A.P., Parodi J.H., Taylor M., “The place of Biometrics in A User Authentication Taxonomy”, Proceedings 13th National Computer Security Conference, Washington, Oct. 1990
Barron J.J., “Putting Fuzzy Logic into Focus“, Byte, April 1993
Johnson J.T., “Fuzzy Logic”, Popular Science, July 1990, pp. 87–89
Kosko B., “Neural Networks and Fuzzy Systems” Prentice Hall International editions, 1992
Kosko B., “Fuzzy Thinking The New Science of Fuzzy Logic” Hyperion, 1993
Zadeh L.A. “Fuzzy sets”, Information and Control, voL 8, pp. 338–353, 1965
Mc Neil D., Freiberger P., Fuzzy Logic, Touchstone Simon & Schuster, 1994
de Ru W.G., Eloff J.H.P., “Passphrase generation through expert system technology”, Proceedings 9th Annual Computer Security Applications Conference, Orlando, Florida, Dec.1993
Menkus B. Understanding the use of Passwords, Computers & Security, 7 (1988) pp. 132–136
Sherman R.L., “Biometrics Futures“, Computers & Security,11 (1992)
Seeley D., “Password cracking: A Game of Wits”, Communications of the ACM June 1989, Volume 32, Number 6
Russel D., Gangemi G.T., Computer Security Basics, O’Reilly and Associates, Inc., July 1991
Obaidat M.S., “A methodology for improving computer access security”, Computers & Security 12 (1993) pp 657–662
West J.W., The acquisition of typewriting skill Pitman Publishers, 1969
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
de Ru, W.G., Eloff, J.H.P. (1995). Reinforcing password authentication with typing biometrics. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_41
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_41
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive