Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/11363
Title: | Behavior Based Approach for User Validation Using Machine Learning |
Authors: | Patel, Kartik |
Keywords: | Computer 2020 Project Report 2020 Computer Project Report Project Report 20MCEI 20MCEI05 INS INS 2020 CE (INS) Authentication Validation Typing behaviour Machine Learning (ML) |
Issue Date: | 1-Jun-2022 |
Publisher: | Institute of Technology |
Series/Report no.: | 20MCEI05; |
Abstract: | In today’s world, security and privacy are the most important considerations for internet users in every application domain. The Internet and applications are currently involved in nearly every area of our day-to-day lives. Users can access lots of things just by using internet connectivity. So, user authentication and validation are very important in this digital world. For a long time, to authenticate and validate the user, traditional systems such as pins, passwords, tokens, and two-factor authentication were used. The majority of applications employ One-Time- Password (OTP) as a two-factor authentication method. OTP shared over SMS, email and third-party applications is valid for a limited time. Also, sometimes in order to receive the OTP, users need a device that has network connectivity. Users may not get or be unable to obtain an OTP for a range of factors, including network issues, severe network traffic, and inability to use a phone. The focus of this paper is to find the optimum method for constructing a validation system that employs ml algorithms to authenticate individuals relying on their keyboard behaviour. In this research we applying different similarity algorithm and find the suit- able approach. Moreover, we discussed about the data set, technique and results with achieving mentioned goal. |
URI: | http://10.1.7.192:80/jspui/handle/123456789/11363 |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
20MCEI05.pdf | 20MCEI05 | 1.3 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.