A study on continuous authentication using a combination of keystroke and mouse biometrics

被引:76
|
作者
Mondal, Soumik [1 ]
Bours, Patrick [1 ]
机构
[1] NTNU Norwegian Univ Sci & Technol, NISlab Norwegian Informat Secur Lab, Gjovik, Norway
关键词
Continuous authentication; Behavioural biometrics; Mouse dynamics; Keystroke dynamics; Trust model; Feature selection; Performance measure; IDENTITY VERIFICATION; USER AUTHENTICATION; DYNAMICS;
D O I
10.1016/j.neucom.2016.11.031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we focus on a context independent continuous authentication system that reacts on every separate action performed by a user. We contribute with a robust dynamic trust model algorithm that can be applied to any continuous authentication system, irrespective of the biometric modality. We also contribute a novel performance reporting technique for continuous authentication. Our proposed approach was validated with extensive experiments with a unique behavioural biometric dataset. This dataset was collected under complete uncontrolled condition from 53 users by Using our data collection software. We considered both keystroke and mouse usage behaviour patterns to prevent a situation where an attacker avoids detection by restricting to one input device because the system only checks the other input device. During our research, we developed a feature selection technique that could be applied to other pattern recognition problems. The best result obtained in this research is that 50 out of 53 genuine users are never inadvertently locked out by the system, while the remaining 3 genuine users (i.e. 5.7%) are sometimes locked out, on average after 2265 actions. Furthermore, there are only 3 out of 2756 impostors not been detected, i.e. only 0.1% of the impostors go undetected. Impostors are detected on average after 252 actions.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 50 条
  • [1] Password Authentication using Keystroke Biometrics
    D'Lima, Nathan
    Mittal, Jayashri
    [J]. 2015 International Conference on Communication, Information & Computing Technology (ICCICT), 2015,
  • [2] Keystroke Biometrics for Student Authentication: A Case Study
    Morales, Aythami
    Fierrez, Julian
    [J]. ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 337 - 337
  • [3] Improving Reliability: User Authentication on Smartphones Using Keystroke Biometrics
    Wang, Yuhua
    Wu, Chunhua
    Zheng, Kangfeng
    Wang, Xiujuan
    [J]. IEEE ACCESS, 2019, 7 : 26218 - 26228
  • [4] Fuzzy and Markov models for keystroke biometrics authentication
    Tran, Dat
    Ma, Wanli
    Chetty, Girija
    Sharma, Dharmendra
    [J]. NEW ADVANCES IN SIMULATION, MODELLING AND OPTIMIZATION (SMO '07), 2007, : 89 - +
  • [5] Continuous Authentication Using Behavioral Biometrics
    Deutschmann, Ingo
    Nordstrom, Peder
    Nilsson, Linus
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 12 - 15
  • [6] An Usability Study of Continuous Biometrics Authentication
    Kwang, Geraldine
    Yap, Roland H. C.
    Sim, Terence
    Ramnath, Rajiv
    [J]. ADVANCES IN BIOMETRICS, 2009, 5558 : 828 - +
  • [7] Enhanced Authentication Using Keystroke and Mouse Dynamics
    Boopathi, Mythili
    Vani, M. P.
    [J]. ADVANCES IN KEY ENGINEERING MATERIALS, 2011, 214 : 230 - 234
  • [8] BioPrivacy: a behavioral biometrics continuous authentication system based on keystroke dynamics and touch gestures
    Stylios, Ioannis
    Skalkos, Andreas
    Kokolakis, Spyros
    Karyda, Maria
    [J]. INFORMATION AND COMPUTER SECURITY, 2022, 30 (05) : 687 - 704
  • [9] A comparative study of Mouse and Keystroke Based Authentication
    Handa, Jigyasa
    Singh, Saurabh
    Saraswat, Shipra
    [J]. 2019 9TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE & ENGINEERING (CONFLUENCE 2019), 2019, : 670 - 674
  • [10] Combining Keystroke and Mouse Dynamics for Continuous User Authentication and Identification
    Mondal, Soumik
    Bours, Patrick
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON IDENTITY, SECURITY AND BEHAVIOR ANALYSIS (ISBA), 2016,