Calculate the false rejection, Computer Network Security

Assignment Help:

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate the deviation (D) between the enrollment phase time data (also referred to as a  target or reference time) and the verification phase time data, (also known as a monitored time) for the two columns representing the Fly Times and the Dwell Time. You can use either of the First Key Dwell Time column values or the Second Key Dwell Time column values in your data set, however you have to use the same column throughout your implementation.

2209_Calculate the False Rejection.png

Where | | denotes the absolute value function, tref is the targeted or reference time for dwell or fly time values (from the enrollment phase data) and tmon is the monitored time for dwell or fly time values (from the verification phase data), Di is the set of fly time values in the sample, Mo is the set of dwell time in the sample, and n is the size of the sample. The type of n (as well as the sizes of Di and Mo) should be declared as a variable in your implementation, but it should be assigned the maximum possible value of 500.

  • To calculate the False Rejection (FR) for a given user, compare each of the five verification session data of the same user against the enrollment set data by calculating the deviation for the fly times and dwell time. Note that this will produce '5' different values of D (one for each set of verification session data). For each of those of D's, if D>=Thr, FR=1 else FR=0, where D is the calculated value for the deviation and Thr is the value of threshold%. 
  • To calculate the False Acceptance (FA) for the same user (as above), compare each of the verification session data of the 4 remaining users against the enrollment set data of the same user by calculating the deviation for the fly times and dwell time. Note that this will produce '5*4=20' different values of D (one for each set of verification session data for each different user). For each of those D's, if D<= Thr, FA=1 else FA=0, where D is the calculated value for the deviation and Thr is the value of threshold%. 

Now that you have got the values of FA and FR for this user, you can calculate the  False Acceptance Rate (FAR) and the False Rejection Rate (FRR) for this user by computing:

                             FAR=Sum of FA/total number of verification trials 
                             FRR=Sum of FR/Total number of verification trials

If both computed FAR and  FRR  values are <= 0.4, then the FAR and the FRR conditions are satisfied. In this case, the algorithm should printout 'Access Granted! and list the file (name and location) accessible and what kind of access right to those file the user has. If the FAR and the FRR conditions fail, the message could be  'Access Failed! Your attempt and corresponding IP used will be reported to the system administrator."


Related Discussions:- Calculate the false rejection

Find the services implemented on your computer, Question: (a) Which typ...

Question: (a) Which type of attacker represents the most likely and most damaging risk to your network? (b) What is the basic reason that social engineering attacks succeed?

Transmission errors in networking, TRANSMISSION ERRORS:  Transmission...

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh

Bus topology, In BUS topology every computer is directly connected to p...

In BUS topology every computer is directly connected to primary network cable in a single way. Bus networks are the easiest way to connect multiple users, but can have problems

Professional issues in information technology, Thinking ethically is diffic...

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

Packet filtering firewall, Packet Filtering Firewall Packet filtering i...

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

Network intrusion system, In this work a network intrusion system (package)...

In this work a network intrusion system (package) must implement based on high interaction honeypots. There are two honeypots with different platforms (ubuntu and windows server 20

Explain in des data encryption standard, Explain in DES Data Encryption Sta...

Explain in DES Data Encryption Standard : DES stands for Data Encryption Standard and is explained as follows: DES is at present the most widely used key cryptographic systems

Describe how lower bounds on arc flows, QUESTION: (a) Suppose the graph ...

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Military and space technology, crack the secret message and explain how the...

crack the secret message and explain how the code works. The clue is that it has something to do with the computer keyboard. J-Q-H-6 Q-E-F-Q-H-D-3-W 8-H 5-Y-3 7-W-3 9-R--D-9-J

Explain transposition ciphers and substitution cipher, What do you understa...

What do you understand by cryptanalysis? Discuss about the transposition ciphers substitution cipher, and onetime pads. The messages which are intended to transmit secretly and

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd