Improving Network Security Using Key-Stroke Dynamics: A Case Study at Anglican Senior High School

dc.contributor.authorBoakye Obeng, Michael
dc.date.accessioned2017-01-17T12:42:50Z
dc.date.accessioned2023-04-19T12:32:23Z
dc.date.available2017-01-17T12:42:50Z
dc.date.available2023-04-19T12:32:23Z
dc.date.issuedNovember, 2016
dc.descriptionA Thesis Submitted to the Department of Computer Science, College of Sciences in partial fulfillment of the requirement for the degree of Master of Philosophy in Information Technology, en_US
dc.description.abstractSystem administrators and safety professionals know that relying on only “userID” and “user Password” to validate users is basically not virtually efficient, particularly where system safety is at stake. A procedure known as keystroke dynamics (or, typing dynamics) is rising as an helpful way to fortify user certification. Keystroke dynamics is a thorough explanation of the timing of key-down and key-up proceedings when users enter usernames, passwords, or any other cord of lettering. Because a user's keystroke timings are as individual as handwriting or a autograph, keystroke dynamics can be used as part of a proposal to confirm a user's uniqueness. That is the idea after keystroke dynamics. Some researchers and developers have built many techniques more or less using this keystroke dynamics biometric as a form of validation to Web-based applications, e-mail and networks. This research project seeks to provide improved technique over the works of these researchers and developers, providing second layer of security to user’s identity authentication and verification process, using keystroke dynamics on the user’s computer rather than inculcating in network server authentication process. A resultant software application from this research project is named “BioNetLogon” developed in VB.Net environment. It comes with interfaces that authenticate users (against database of users keystroke patterns) after windows logon stage, whilst controlling the user’s computer network services to ensure that only successful authenticated user gets access to the Windows desktop as well as network resources of his/her computer. Otherwise, the user is blocked from getting access to the network environment with the network services disabled.en_US
dc.description.sponsorshipKNUSTen_US
dc.identifier.urihttps://ir.knust.edu.gh/handle/123456789/9908
dc.language.isoenen_US
dc.titleImproving Network Security Using Key-Stroke Dynamics: A Case Study at Anglican Senior High Schoolen_US
dc.typeThesisen_US
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Boakye Obeng Michael .pdf
Size:
5.21 MB
Format:
Adobe Portable Document Format
Description:
Full Thesis
License bundle
Now showing 1 - 2 of 2
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.73 KB
Format:
Item-specific license agreed to upon submission
Description:
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: