Improving Network Security Using Key-Stroke Dynamics: A Case Study at Anglican Senior High School

Loading...
Thumbnail Image
Date
November, 2016
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
System administrators and safety professionals know that relying on only “userID” and “user Password” to validate users is basically not virtually efficient, particularly where system safety is at stake. A procedure known as keystroke dynamics (or, typing dynamics) is rising as an helpful way to fortify user certification. Keystroke dynamics is a thorough explanation of the timing of key-down and key-up proceedings when users enter usernames, passwords, or any other cord of lettering. Because a user's keystroke timings are as individual as handwriting or a autograph, keystroke dynamics can be used as part of a proposal to confirm a user's uniqueness. That is the idea after keystroke dynamics. Some researchers and developers have built many techniques more or less using this keystroke dynamics biometric as a form of validation to Web-based applications, e-mail and networks. This research project seeks to provide improved technique over the works of these researchers and developers, providing second layer of security to user’s identity authentication and verification process, using keystroke dynamics on the user’s computer rather than inculcating in network server authentication process. A resultant software application from this research project is named “BioNetLogon” developed in VB.Net environment. It comes with interfaces that authenticate users (against database of users keystroke patterns) after windows logon stage, whilst controlling the user’s computer network services to ensure that only successful authenticated user gets access to the Windows desktop as well as network resources of his/her computer. Otherwise, the user is blocked from getting access to the network environment with the network services disabled.
Description
A Thesis Submitted to the Department of Computer Science, College of Sciences in partial fulfillment of the requirement for the degree of Master of Philosophy in Information Technology,
Keywords
Citation