IMPROVING NETWORK SECURITY USING KEY STROKE DYNAMICS
ABSTRACT
System administrators and safety professionals know that relying on only user ID and user Password to validate users is basically not virtually efficient, particularly where system safety is at stake. A procedure known as keystroke dynamics (or, typing dynamics) is rising as an helpful way to fortify user certification. Keystroke dynamics is a thorough explanation of the timing of key-down and key-up proceedings when users enter usernames, passwords, or any other cord of lettering. Because a user’s keystroke timings are as individual as handwriting or a autograph, keystroke dynamics can be used as part of a proposal to confirm a user’s uniqueness. That is the idea after keystroke dynamics. Some researchers and developers have built many techniques more or less using this keystroke dynamics biometric as a form of validation to Web-based applications, e-mail and networks.
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE STUDY
Currently most of the system use basic security technique or many hardware or network devices to secure his personal computer and industrial computer. Basically now use technology for user authentication is username password and extends one step toward use biometric hardware system. But such technology is not user friendly and flexible in some cases. This biometric system make work more complicated, lengthily and more costly. There also exist another user behaviour authentication system this system uses image processing technology, but there also create some limitation because of camera.
In this study we introduce Keystroke Dynamics Authentication with Project Management System it uses keystroke dynamics technology for user authentication without