Continuous authentication by free-text keystroke based on CNN and RNN

被引:29
|
作者
Lu, Xiaofeng [1 ]
Zhang, Shengfei [1 ]
Hui, Pan [2 ]
Lio, Pietro [3 ]
机构
[1] Beijing Univ Post & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[3] Univ Cambridge, Comp Lab, Cambridge, England
基金
中国国家自然科学基金;
关键词
Authentication; Keystroke dynamics; Free-text; CNN; RNN;
D O I
10.1016/j.cose.2020.101861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Personal keystroke modes are difficult to imitate and can therefore be used for identity authentication. The keystroke habits of a person can be learned according to the keystroke data generated when the person inputs free text. Detecting a user's keystroke habits as the user enters text can continuously verify the user's identity without affecting user input. The method proposed in this paper authenticates users via their keystrokes when they type free text. The user keystroke data is divided into a fixed-length keystroke sequence, which is then converted into a keystroke vector sequence according to the time feature of the keystroke. A model that combines a convolutional neural network and a recursive neural network is used to learn a sequence of individual keystroke vectors to obtain individual keystroke features for identity authentication. The model is tested using two open datasets, and the best false rejection rate (FRR) is found to be (2.07%,6.61%), the best false acceptance rate (FAR) is found to be (3.26%, 5.31%), and the best equal error rate (EER) is found to be (2.67%, 5.97%). (C) 2020 The Author(s). Published by Elsevier Ltd.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Scan-Based Evaluation of Continuous Keystroke Authentication Systems
    Serwadda, Abdul
    Wang, Zibo
    Koch, Patrick
    Govindarajan, Sathya
    Pokala, Raviteja
    Goodkind, Adam
    Brizan, David-Guy
    Rosenberg, Andrew
    Phoha, Vir V.
    Balagani, Kiran
    IT PROFESSIONAL, 2013, 15 (04) : 20 - 23
  • [42] Iterative Keystroke Continuous Authentication: A Time Series Based Approach
    Alshehri A.
    Coenen F.
    Bollegala D.
    KI - Kunstliche Intelligenz, 2018, 32 (04): : 231 - 243
  • [43] FREE-TEXT ANALYSIS
    PIETRZYK, PM
    INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1995, 39 (01): : 139 - 144
  • [44] One-Class Models for Continuous Authentication Based on Keystroke Dynamics
    Kazachuk, Maria
    Kovalchuk, Alexander
    Mashechkin, Igor
    Orpanen, Igor
    Petrovskiy, Mikhail
    Popov, Ivan
    Zakliakov, Roman
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016, 2016, 9937 : 416 - 425
  • [45] A Continuous Fusion Authentication for Android based on Keystroke Dynamics and Touch Gesture
    Putri, Alifa Nurani
    Asnar, Yudistira Dwi Wardhana
    Akbar, Saiful
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2016,
  • [46] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Imane Lamiche
    Guo Bin
    Yao Jing
    Zhiwen Yu
    Abdenour Hadid
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4417 - 4430
  • [47] On the Design of an Authentication system based on Keystroke Dynamics Using a Predefined Input Text
    Bartmann, Dieter
    Bakdi, Idir
    Achatz, Michael
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (02) : 1 - 12
  • [48] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Lamiche, Imane
    Bin, Guo
    Jing, Yao
    Yu, Zhiwen
    Hadid, Abdenour
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4417 - 4430
  • [49] FREE-TEXT SEARCHING IS EASIER
    ROOSE, T
    LIBRARY JOURNAL, 1986, 111 (03) : 136 - 137
  • [50] HYPERMEDIA AND FREE-TEXT RETRIEVAL
    DUNLOP, MD
    VANRIJSBERGEN, CJ
    INFORMATION PROCESSING & MANAGEMENT, 1993, 29 (03) : 287 - 298