Asma Salem | University of Jordan (original) (raw)

Asma Salem

Asma Salem received her Bachelor of computer engineering in form Balqa applied University in 2008 with excellent grades (3.71/4). Asma worked as full time Senior Administrator at NITC (National Information Technology Center) for nine years. Working as Senior Infrastructure Microsoft System Engineer, administrating Web
Address: Amman, Al Balqa', Jordan

less

Uploads

Papers by Asma Salem

Research paper thumbnail of Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices

— in this paper user verification and identification system on touch screen mobile devices is pro... more — in this paper user verification and identification system on touch screen mobile devices is proposed. The system examines the keystroke dynamics and uses it as a second authentication factor. The study proposes a prototype for a keyboard application developed for collecting timing and non-timing information from keystroke dynamics. In addition to other mentioned in literature studies, we propose complex password combination, which consists of text, numbers, and special characters. Strengthening access control using artificial neural networking model is suggested. Neural network model based on multilayer perceptron classifier which uses back propagation algorithm is proposed. This paper presents a unique approach for combining timing and non-timing features together, as it includes several non-timing features such pressure, size, and position in addition to the duration time features. Several experiments have been done based on specific machine learning for data mining and classification toolkit named WEKA. The obtained results show that keystroke dynamics provides acceptable level of performance measures as a second authentication factor. The distinguishable role for non-timing features beside the timing features is demonstrated. These features have a significant role for improving the performance measures of keystroke dynamic behavioral authentication. The proposed model achieves lower error rate of false acceptance of 2.2%, false rejection of 8.67%, and equal error rate of 5.43% which are better than most of references provided in the literature.

Research paper thumbnail of A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices

Nowadays most systems became computerized and use internet for remote access, including systems w... more Nowadays most systems became computerized and use internet for remote access, including systems which have critical and sensitive data such as banks and governmental institutions. This led to the huge need for a reliable and efficient authentication system to secure data. User authentication is mostly done using passwords. But it is not a sufficient way to use just a password since it has many drawbacks, like guessing them, brute force attacks, key-loggers and social engineering. Additional authentication procedure is needed to enhance password security. Keystroke dynamics is one of the famous behavioral measurements that rely on utilizing the typing rhythm of each individual. It is used to strengthen password authentication in an efficient and cheap way since no hardware will be added. This paper presents a comprehensive survey on research in the last two decades on keystroke dynamics authentication. The objective is to discuss, summarize and provide insightful comparison about the well-known approaches used in keystroke dynamics such as statistical and neural network approaches, as well as offering suggestions and possible future research directions, especially for touch-screen and mobile devices. Keystroke dynamics could provide a second authentication factor for touch screen devices, as they are rapidly increasing in their use and are replacing the classical keyboards in the markets.

Research paper thumbnail of Facebook Distributed System Case Study For Distributed System Inside Facebook Datacenters

Facebook is recognized as the largest online social network system in the last few years, which i... more Facebook is recognized as the largest online social network system in the last few years, which is come up with billions numbers of users in the last 2013. The system is recognized as distributed system in its design, infrastructure and architecture .The datacenters behind this network system are huge, robust, keeping the system scalable, reliable, secure, and let the Facebook accessible from anywhere with highly availability

Research paper thumbnail of Analysis of Strong Password Using Keystroke Dynamics Authentication in Touch Screen Devices

— in this paper user verification and identification system on touch screen mobile devices is pro... more — in this paper user verification and identification system on touch screen mobile devices is proposed. The system examines the keystroke dynamics and uses it as a second authentication factor. The study proposes a prototype for a keyboard application developed for collecting timing and non-timing information from keystroke dynamics. In addition to other mentioned in literature studies, we propose complex password combination, which consists of text, numbers, and special characters. Strengthening access control using artificial neural networking model is suggested. Neural network model based on multilayer perceptron classifier which uses back propagation algorithm is proposed. This paper presents a unique approach for combining timing and non-timing features together, as it includes several non-timing features such pressure, size, and position in addition to the duration time features. Several experiments have been done based on specific machine learning for data mining and classification toolkit named WEKA. The obtained results show that keystroke dynamics provides acceptable level of performance measures as a second authentication factor. The distinguishable role for non-timing features beside the timing features is demonstrated. These features have a significant role for improving the performance measures of keystroke dynamic behavioral authentication. The proposed model achieves lower error rate of false acceptance of 2.2%, false rejection of 8.67%, and equal error rate of 5.43% which are better than most of references provided in the literature.

Research paper thumbnail of A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices

Nowadays most systems became computerized and use internet for remote access, including systems w... more Nowadays most systems became computerized and use internet for remote access, including systems which have critical and sensitive data such as banks and governmental institutions. This led to the huge need for a reliable and efficient authentication system to secure data. User authentication is mostly done using passwords. But it is not a sufficient way to use just a password since it has many drawbacks, like guessing them, brute force attacks, key-loggers and social engineering. Additional authentication procedure is needed to enhance password security. Keystroke dynamics is one of the famous behavioral measurements that rely on utilizing the typing rhythm of each individual. It is used to strengthen password authentication in an efficient and cheap way since no hardware will be added. This paper presents a comprehensive survey on research in the last two decades on keystroke dynamics authentication. The objective is to discuss, summarize and provide insightful comparison about the well-known approaches used in keystroke dynamics such as statistical and neural network approaches, as well as offering suggestions and possible future research directions, especially for touch-screen and mobile devices. Keystroke dynamics could provide a second authentication factor for touch screen devices, as they are rapidly increasing in their use and are replacing the classical keyboards in the markets.

Research paper thumbnail of Facebook Distributed System Case Study For Distributed System Inside Facebook Datacenters

Facebook is recognized as the largest online social network system in the last few years, which i... more Facebook is recognized as the largest online social network system in the last few years, which is come up with billions numbers of users in the last 2013. The system is recognized as distributed system in its design, infrastructure and architecture .The datacenters behind this network system are huge, robust, keeping the system scalable, reliable, secure, and let the Facebook accessible from anywhere with highly availability

Log In