COMPUTER-BASED LOCAL AREA AUTHENTICATION SYSTEM

2018 ◽  
Vol 6 (3) ◽  
pp. 1
Author(s):  
OMOROGIUWA O. S. ◽  
AZIKEN G. O. ◽  
◽  
2019 ◽  
Vol 5 (1) ◽  
pp. 73-80
Author(s):  
Yohanes Setiawan Japriadi ◽  
Lukas Tommy

Modernization causes the examination process in some educational institutions that are usually done conventionally now start to change to CBT (Computer Based Test). At STMIK Atma Luhur, CBT in the form of a coding test carried out on a computer laboratory was felt to be not effective enough due to a short correction time, as well as the possibility of lossing the students work due to sudden power failure. Collection of jobs using an LAN (Local Area Network) intranet network can not be realized due to the difficult network configuration and requires not a small cost. One solution that can be offered in overcoming the above problem is to create a web-based exam application that is connected to a Wireless Local Area Network (WLAN) intranet network. The system development model and tools used in this study are prototype models and UML (Unified Modeling Language). The proposed application is effective in facilitating and accelerating the process of collecting student answer files from several client computers to a server computer. In addition, the usage of the proposed application allows the lecturer not to correct students' answers in a hurry, so that the scores that are truly objective and can be accounted for are obtained.


2013 ◽  
pp. 268-293
Author(s):  
Harini Jagadeesan ◽  
Michael S. Hsiao

In the Internet age, identity theft is a major security issue because contemporary authentication systems lack adequate mechanisms to detect and prevent masquerading. This chapter discusses the current authentication systems and identifies their limitations in combating masquerading attacks. Analysis of existing authentication systems reveals the factors to be considered and the steps necessary in building a good continuous authentication system. As an example, we present a continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. It employs a novel heuristic based on keyboard and mouse attributes to decipher the behavioral pattern of each individual user on the system. In the re-authentication process, the current behavior of user is compared with stored “expected” behavior. If user behavior deviates from expected behavior beyond an allowed threshold, system logs the user out of the current session, thereby preventing imposters from misusing the system. Experimental results show that the proposed methodology improves the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively. At the end of this chapter, the reader is expected to understand the dimensions involved in creating a computer based continuous authentication system and is able to frame a robust continual re-authentication system with a high degree of accuracy.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Saleh M. Al-Saleem ◽  
Hanif Ullah

Many organizations and institutions around the globe are moving or planning to move their paper-and-pencil based testing to computer-based testing (CBT). However, this conversion will not be the best option for all kinds of exams and it will require significant resources. These resources may include the preparation of item banks, methods for test delivery, procedures for test administration, and last but not least test security. Security aspects may include but are not limited to the identification and authentication of examinee, the risks that are associated with cheating on the exam, and the procedures related to test delivery to the examinee. This paper will mainly investigate the security considerations associated with CBT and will provide some recommendations for the security of these kinds of tests. We will also propose a palm-based biometric authentication system incorporated with basic authentication system (username/password) in order to check the identity and authenticity of the examinee.


2017 ◽  
Vol 8 (2) ◽  
pp. 114-124
Author(s):  
Agus Tedyyana ◽  
Danuri Danuri

Abstrak- Penyeleksian calon mahasiswa baru dapat dilakukan dengan aplikasi Computer Based Test (CBT). Metode yang digunakan meliputi teknik pengumpulan data, analisis sistem, model perancangan, implementasi dan pengujian. Penelitian ini menghasilkan aplikasi CBT dimana soal yang dimunculkan dari bank soal melalui proses pengacakan dengan tidak akan memunculkan soal yang sama dengan menggunakan metoda Fisher-Yates Shuffle. Dalam proses pengamanan informasi soal saat terhubung ke jaringan maka diperlukan teknik untuk penyandian pesan agar soal tersebut sebeum dimunculkan melewati proses enkripsi dan deskripsi data terlebih dahulu maka digunakan algoritma kriptografi RSA. Metode perancangan perangkat lunak menggunakan model waterfall, perancangan database menggunakan entity relationship diagram, perancangan antarmuka menggunakan hypertext markup language (HTML) Cascading Style Sheet (CSS) dan jQuery serta diimplementasikan berbasis web dengan menggunakan bahasa pemrograman PHP dan database MySQL, Arsitektur jaringan yang digunakan aplikasi Computer Based Test adalah model jaringan client-server dengan jaringan Local Area Network (LAN). Kata kunci: Computer Based Test, Fisher-Yates Shuffle, Criptography, Local Area Network Abstract- Selection of new student candidates can be done with Computer Based Test (CBT) application. The methods used include data collection techniques, system analysis, design model, implementation and testing. This study produces a CBT application where the questions raised from the question bank through randomization process will not bring up the same problem using the Fisher-Yates Shuffle method. In the process of securing information about the problem when connected to the network it is necessary techniques for encoding the message so that the problem before appear through the process of encryption and description of data first then used RSA cryptography algorithm. Software design method using waterfall model, database design using entity relationship diagram, interface design using hypertext markup language (HTML) Cascading Style Sheet (CSS) and jQuery and implemented web-based using PHP programming language and MySQL database, Network architecture used application Computer Based Test is a client-server network model with a Local Area Network (LAN) network. Keywords: Computer Based Test, Fisher-Yates Shuffle, Criptography, Local Area Network


Author(s):  
Harini Jagadeesan ◽  
Michael S. Hsiao

In the Internet age, identity theft is a major security issue because contemporary authentication systems lack adequate mechanisms to detect and prevent masquerading. This chapter discusses the current authentication systems and identifies their limitations in combating masquerading attacks. Analysis of existing authentication systems reveals the factors to be considered and the steps necessary in building a good continuous authentication system. As an example, we present a continual, non-intrusive, fast and easily deployable user re-authentication system based on behavioral biometrics. It employs a novel heuristic based on keyboard and mouse attributes to decipher the behavioral pattern of each individual user on the system. In the re-authentication process, the current behavior of user is compared with stored “expected” behavior. If user behavior deviates from expected behavior beyond an allowed threshold, system logs the user out of the current session, thereby preventing imposters from misusing the system. Experimental results show that the proposed methodology improves the accuracy of application-based and application independent systems to 96.4% and 82.2% respectively. At the end of this chapter, the reader is expected to understand the dimensions involved in creating a computer based continuous authentication system and is able to frame a robust continual re-authentication system with a high degree of accuracy.


2020 ◽  
Vol 10 (3) ◽  
pp. 172-176
Author(s):  
Arda Editya ◽  
Neny Kurniati

Performa sebuah server saat ini menjadi salah satu kunci untuk menilai apakah sebuah servis yang bergerak dibidang aplikasi digital termasuk baik atau tidak. Salah satu servis yang sering digunakan pada saat ini adalah sistem ujian online atau yang lebih dikenal dengan istilah CBT (Computer Based Test). Dimana pada servis ini membutuhkan performa server yang mumpuni untuk melayani siswa dalam mellihat soal dan juga mengoreksi jawaban siswa secara realtime. Permasalahan yang ada saat ini adalah para penyelenggara CBT seperti sekolah, institusi pendidikan dan lain sebgainya belum memiliki patokan server yang efisien dalam menentukan spesifikasi server yang sesuai dengan kebutuhan. Terlebih lagi teknologi mikro server saat ini yang banyak dikembangkan di luar negeri memberikan sebuah kesempatan untuk menerapkan servis ujian online ini lebih marak dan dapat digunakan untuk masyarakat Indonesia secara luas. Pada penelitian kali ini server akan diuji menggunakan metode pengujian yang bertumpu pada 2 bidang besar yakni sumber daya server dan juga jaringan komputer. Dimana untuk sumber daya server kali ini kita akan melihat bagaimana penggunaan sumber daya mikro server saat menjalankan servis ujian online/ CBT. Berikutnya adalah pengujian dari sisi jaringan komputer dimana pada sisi jaringan komputer disini kita menggunakan metode simple network testing tools dan melihat bagaimana aktifitas jaringan komputer yang berjalan pada mikro server saat menjalankan servis ujian online/ CBT. Hasil yang dapat ditarik dari metode pengujian yang telah dilakukan adalah dari sisi sumber daya server adalah penggunaan prosesor lebih dominan digunakan daripada penggunaan RAM pada mikros server hal ini dibuktikan dengan rata-rata pengujian didapatkan hasil penggunaan prosesor adalah 55,5% dari 100% sedangkan penggunaan RAM adalah 35,7% dari 100% hal ini dikarenakan prosesor memproses jawaban yang telah dikirim oleh siswa dan dilanjutkan pada proses input pada database yang ada pada server, sedangkan RAM berfungsi sebagai menyimpan beberapa komponen web yang akan ditampilkan pada client dimana semakin besar file yang digunakan pada sistem CBT juga akan mempengaruhi berapa besar RAM yang akan digunakan. Dari sisi jaringan komputer didapatkan hasil pengujian ping menuju server memiliki rata-rata keberhasilan mengantarkan paket 95% dan memiliki rata-rata kegagalan mengantarkan paket 5% hal ini diakibatkan oleh keterbatasan perangkat jaringan komputer khususnya perangkat jaringan wifi yang memiliki keterbatasan dalam memproses paket yang keluar dan masuk. Berdasarkan penelitian diatas dapat disimpulkan bahwa penggunaan mikro server pada sistem ujian online/CBT dengan jumlah 35-40 siswa dapat digunakan secara lancar. Sehingga dengan hasil ini maka sekolah yang ingin menerapkan sistem ujian online dapat memanfaatkan mikro server sebagai alternatif pengganti server yang mahal. Terlebih lagi penggunaan mikro server dapat menghemat dari sisi biaya pembelian dan juga biaya listrik dikarenakan mikro server memiliki spesifikasi yang rendah dan juga penggunaan listrik yang sangat kecil dan memungkinkan dapat menggunakan baterai.


Author(s):  
Kenneth Revett

Behavioral biometrics is a relatively new form of authentication mechanism which relies on the way a person interacts with an authentication device. Traditional instances of this approach include voice, signature, and keystroke dynamics. Novel approaches to behavioral biometrics include biosignals, such as the electroencephalogram and the electrocardiogram. The biosignal approach to user authentication has been shown to produce equal error rates on par with more traditional behavioral biometric approaches. In addition, through a process similar to biofeedback, users can be trained with minimal effort to produce computer-based input via the manipulations of endogenous biosignal patterns. This chapter discusses the use of biosignal based biometrics, highlighting key studies and how this approach can be integrated into a multibiometric user authentication system.


Author(s):  
Salvatore Valenti

Most solutions to the problem of delivering course content supporting both student learning and assessment nowadays imply the use of computers, thanks to the continuous advances of information technology. According to Bull (1999), using computers to perform assessment is more contentious than using them to deliver content and to support student learning. In many papers, the terms computer-assisted assessment (CAA) and computer-based assessment (CBA) are often used interchangeably and somewhat inconsistently. The former refers to the use of computers in assessment. The term encompasses the uses of computers to deliver, mark, and analyze assignments or examinations. It also includes the collation and analysis of data gathered from optical mark readers. The latter (that will be used in this paper) addresses the use of computers for the entire process, including assessment delivery and feedback provision (Charman & Elmes, 1998). A typical CBA system is composed of the following. • Test-Management System (TMS) - that is, a tool providing the instructor with an easy-to-use interface, the ability to create questions and to assemble them into tests, and the possibility of grading the tests and making some statistical evaluations of the results • Test-Delivery System (TDS) - that is, a tool for the delivery of tests to the students. The tool may be used to deliver tests using paper and pencil, or a stand-alone computer on a LAN (local area network) or over the Web. The TDS may be augmented with a Web enabler used to deliver the tests over the Internet. In many cases, producers distribute two different versions of the same TDS: one to deliver tests either on single computers or on a LAN and the other to deliver tests over the WWW (World Wide Web). This is the policy adopted, for instance, by Cogent Computing Co. (2004) with CQuest LAN and CQuest Net. The TMS and TDS modules may be integrated in a single application as, for instance, Perception developed by Question Mark Computing (2004), or may be delivered as separate applications as it occurs for MicroTest and MicroGrade developed by Chariot Software Group (2004).


Author(s):  
M. Marko ◽  
A. Leith ◽  
D. Parsons

The use of serial sections and computer-based 3-D reconstruction techniques affords an opportunity not only to visualize the shape and distribution of the structures being studied, but also to determine their volumes and surface areas. Up until now, this has been done using serial ultrathin sections.The serial-section approach differs from the stereo logical methods of Weibel in that it is based on the Information from a set of single, complete cells (or organelles) rather than on a random 2-dimensional sampling of a population of cells. Because of this, it can more easily provide absolute values of volume and surface area, especially for highly-complex structures. It also allows study of individual variation among the cells, and study of structures which occur only infrequently.We have developed a system for 3-D reconstruction of objects from stereo-pair electron micrographs of thick specimens.


Sign in / Sign up

Export Citation Format

Share Document