Robust Security System for Critical Computers

Full Text (PDF, 216KB), PP.24-29

Views: 0 Downloads: 0

Author(s)

Preet Inder Singh 1,*

1. Department of CSE, Lovely Professional University (Punjab), Phagwara

* Corresponding author.

DOI: https://doi.org/10.5815/ijitcs.2012.06.04

Received: 24 Aug. 2011 / Revised: 20 Dec. 2011 / Accepted: 19 Feb. 2012 / Published: 8 Jun. 2012

Index Terms

Thumb impression, Keystroke Dynamics, Computer Security & User Authentication etc

Abstract

Among the various means of available resource protection including biometrics, password based system is most simple, user friendly, cost effective and commonly used, but this system having high sensitivity with attacks. Most of the advanced methods for authentication based on password encrypt the contents of password before storing or transmitting in physical domain. But all conventional cryptographic based encryption methods are having its own limitations, generally either in terms of complexity, efficiency or in terms of security. In this paper a simple method is developed that provide more secure and efficient means of authentication, at the same time simple in design for critical systems. Apart from protection, a step toward perfect security has taken by adding the feature of intruder detection along with the protection system. This is possible by merging various security systems with each other i.e password based security with keystroke dynamic, thumb impression with retina scan associated with the users. This new method is centrally based on user behavior and users related security system, which provides the robust security to the critical systems with intruder detection facilities.

Cite This Paper

Preet Inder Singh, "Robust Security System for Critical Computers", International Journal of Information Technology and Computer Science(IJITCS), vol.4, no.6, pp.24-29, 2012. DOI:10.5815/ijitcs.2012.06.04

Reference

[1]S. Bleha and M. S. Obaidat, “Dimensionality reduction and feature extraction applications in identifying computer users,” IEEE Trans. Sys. Man. Cybem., vol. 21, pp. 452-456, Mar./Apr. 1991.

[2]Jain, A. R. a. A. "Information fusion in biometrics." Pattern Recognition Letters, 24(13), pp. 2115-2125, (2003).

[3]U.Dieckmann, R. W. F. a. "Bioid: A multimodal biometric identification systems." IEEE Computer, 33(2), pp. 64-68, (2000).

[4]F. Monrose, a. D. R. "Keystroke Dynamics as a Biometric for Authentication." Future Generation Computing Systems (FGCS), 12(12), pp. 351-359, (2000).

[5]Checco, J. C. “Keystroke dynamics & corporate security”. WSTA, 241 Maple Avenue, Red Bank, NJ 07701, 2006.http://www.wsta.org/publications/articles/1003_article06.html

[6]Davide Maltoni, D. M., Anil K.Jain, Salil Prabhakar Handbook of fingerprint recognition. New York: Springer, (2003).

[7]Anil K. Jain, Arun Ross, and Salil Prabhakar, "An Introduction to Biometric Recognition." IEEE Transactions On Circuits And Systems for Video Technology, 14(1), pp. 4-20, (2004).

[8]F. Monrose, a. D. R. "Keystroke Dynamics as a Biometric for Authentication." Future Generation Computing Systems (FGCS), 12(12), pp. 351-359, (2000).

[9]Preet Inder Singh, Gour Sundar Mitra Thakur, "Enhanced Password Based Security System Based on User Behavior Using Neural Networks" International Journal of Information Engineering and Electronic Business (IJIEEB), vol. 4, no. 2, pp.29-35, 2012.

[10]Modi, S. K., & Elliott, S. J., ”Keystroke Dynamics Verification Using Spontaneously Generated Password”, 40th IEEE International Carnahan Conferences Security Technology. Lexington, Kentucky, (2006).

[11]R. Stockton Gaines, William Lisowski, S. James Press, and Norman Shapiro “Authentication by keystroke timing: Some preliminary results”. Rand Report R-256- NSF, (1980).

[12]Arau jo, L.C.F., Sucupira Jr., L.H.R., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T., “User authentication through typing biometrics features”. IEEE Trans. on Signal Processing, 53 (2), 851–855, (2005).

[13]J. Goldberg, J. Hagman, and V. Sazawal, "Doodling Our Way to Better Authentication," presented at Proceedings of Human Factors in Computing Systems (CHI), Minneapolis, Minnesota, USA, 2002.

[14]Lawrence O’Gorman, “Comparing Passwords, Tokens, and Biometrics for User Authentication”, Proceedings of the IEEE, Vol. 91, No. 12, Dec, pp. 2019-2040, 2003.

[15]A. Peacock, X. Ke and M. Wilkerson, “Typing patterns: A key to user Identification”, IEEE Security and Privacy 2(5) (2004). 

[16]Ahmed Awad E. Ahmed, and Issa Traore, “Anomaly Intrusion Detection based on Biometrics”, Proceedings of the IEEE, 2005.

[17]John C. Checco," Keystroke Dynamics and Corporate Security", 2003.

[18]Arndt, C. (2005). The loss of privacy and identity, Biometric Technology Today.

[19]Matsumoto, T., H. Matsumoto, et al. (2002). Impact of Artificial Gummy Fingers on Fingerprint Systems. Optical Security and Counterfeit Deterrence Techniques IV, Proceedings of SPIE.

[20]FIDIS (2005). D3.2: A study on PKI and Biometrics. M. Gasson, M. Meints and K. Warwick: 1-138.