Calculate the false rejection, Computer Network Security

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate the deviation (D) between the enrollment phase time data (also referred to as a  target or reference time) and the verification phase time data, (also known as a monitored time) for the two columns representing the Fly Times and the Dwell Time. You can use either of the First Key Dwell Time column values or the Second Key Dwell Time column values in your data set, however you have to use the same column throughout your implementation.

2209_Calculate the False Rejection.png

Where | | denotes the absolute value function, tref is the targeted or reference time for dwell or fly time values (from the enrollment phase data) and tmon is the monitored time for dwell or fly time values (from the verification phase data), Di is the set of fly time values in the sample, Mo is the set of dwell time in the sample, and n is the size of the sample. The type of n (as well as the sizes of Di and Mo) should be declared as a variable in your implementation, but it should be assigned the maximum possible value of 500.

  • To calculate the False Rejection (FR) for a given user, compare each of the five verification session data of the same user against the enrollment set data by calculating the deviation for the fly times and dwell time. Note that this will produce '5' different values of D (one for each set of verification session data). For each of those of D's, if D>=Thr, FR=1 else FR=0, where D is the calculated value for the deviation and Thr is the value of threshold%. 
  • To calculate the False Acceptance (FA) for the same user (as above), compare each of the verification session data of the 4 remaining users against the enrollment set data of the same user by calculating the deviation for the fly times and dwell time. Note that this will produce '5*4=20' different values of D (one for each set of verification session data for each different user). For each of those D's, if D<= Thr, FA=1 else FA=0, where D is the calculated value for the deviation and Thr is the value of threshold%. 

Now that you have got the values of FA and FR for this user, you can calculate the  False Acceptance Rate (FAR) and the False Rejection Rate (FRR) for this user by computing:

                             FAR=Sum of FA/total number of verification trials 
                             FRR=Sum of FR/Total number of verification trials

If both computed FAR and  FRR  values are <= 0.4, then the FAR and the FRR conditions are satisfied. In this case, the algorithm should printout 'Access Granted! and list the file (name and location) accessible and what kind of access right to those file the user has. If the FAR and the FRR conditions fail, the message could be  'Access Failed! Your attempt and corresponding IP used will be reported to the system administrator."

Posted Date: 3/18/2013 1:52:39 AM | Location : United States







Related Discussions:- Calculate the false rejection, Assignment Help, Ask Question on Calculate the false rejection, Get Answer, Expert's Help, Calculate the false rejection Discussions

Write discussion on Calculate the false rejection
Your posts are moderated
Related Questions
how did slavery influence life in the colonies

ADDRESS MASKS To identify receiver, network apply address mask to receiver address and calculate to network address in routing table. It can use Boolean 'and' to calculate the

Describe what the FTAM services are. FTAM  stand for the File Transfer Access and Management: FTAM is an ISO application protocol which performs the operations on files such as.

What are Transmission Impairments? Explain the following concepts with respect to Transmission Impairments a) Attenuation b) Delay Distortion c) Noise ion #Minimum 100 words ac

Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Students were asked about search engine they used.90 of them said they used google chrome,70 used Internet Explorer,40 used Mozilla Firefox,30 used Google Chrome and Internet Explo

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

In the early days when there were some dozen computers machine on the network, it was done individually but now as we have looked that there are millions of computers on the intern

1. Network Design Design your network giving appropriate IP addresses for your hosts. Provide a topology and table showing your addressing scheme. 2. F i re wall po

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time