2011 IEEE 13th International Symposium on High-Assurance Systems Engineering 2011
DOI: 10.1109/hase.2011.16
|View full text |Cite
|
Sign up to set email alerts
|

Effects of User Habituation in Keystroke Dynamics on Password Security Policy

Abstract: Access control systems rely on a variety of methods for authenticating legitimate users and preventing malicious ones from accessing the system. The most commonly used system is a simple username and password approach. This technology has been the de-facto standard for remote authentication applications. A username-password based system assumes that only the genuine users know their own credentials. However, breaching this type of system has become a common occurrence in today's age of social networks and mode… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
11
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(12 citation statements)
references
References 25 publications
1
11
0
Order By: Relevance
“…Moreover, if we take for training the very first samples (1)(2)(3)(4)(5), instead of samples from 196 to 200 (where we believe the user got used to the password), the resulting EER increases from 5.6 ± 1.3% to 35.2 ± 5.5% . A related conclusion was put forward by Syed et al [22] concerning the significant improvement of classifiers rebuilt after users were habituated to the password.…”
Section: Experiments To Tackle Question #1mentioning
confidence: 87%
See 1 more Smart Citation
“…Moreover, if we take for training the very first samples (1)(2)(3)(4)(5), instead of samples from 196 to 200 (where we believe the user got used to the password), the resulting EER increases from 5.6 ± 1.3% to 35.2 ± 5.5% . A related conclusion was put forward by Syed et al [22] concerning the significant improvement of classifiers rebuilt after users were habituated to the password.…”
Section: Experiments To Tackle Question #1mentioning
confidence: 87%
“…This heuristics is in agreement with empirical conclusions presented by Giot et al [9], according to which "it is better to choose passwords based on short, simple and known words". Indeed, habituation/familiarity of the keyed string was also considered as a relevant factor in other works, such as [6,17,18,22].…”
Section: Experiments To Tackle Question #1mentioning
confidence: 99%
“…The Bayes classifier [16], hidden Markov [15], Gaussian mixture [36] and k -nearest neighbor models [37] have been explored, as have different distance measures in [35,46]. More recently neural networks [60,61,52], Support Vector Machines [72,81], and ensemble learning through random forests [6,73] have also been studied.…”
Section: Current Researchmentioning
confidence: 99%
“…The physical characteristics of keystroke dynamics, such as keyboard layout [76], habituation [73,4,43,44] and model update techniques [44,43,4] received increased attention. In [73] the authors theorized that habituation was dependent on the type of password and could be leveraged for building more effective classifiers through the reduction of Equal Error Rates (EER). However, the study was confounded by the presence of larger training samples and lacked a rigorous statistical analysis of the effect of habituation over time.…”
Section: Current Researchmentioning
confidence: 99%
See 1 more Smart Citation