Keystroke Dynamics Analysis for User Authentication Using a Deep Learning Approach

被引:1
|
作者
Altwaijry, Najwa [1 ]
机构
[1] King Saud Univ, Dept Comp Sci, Coll Comp & Informat Sci, Riyadh, Saudi Arabia
关键词
Deep Learning; Convolutional Neural Network; Keystroke Dynamics; Machine Learning; Biometrics;
D O I
10.22937/IJCSNS.2020.20.12.23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the ubiquitous use of the Internet, the importance of secure access to computing resources has grown. Many computer systems authenticate users through a password selected by the user. User typing patterns are usually distinct, allowing users to be differentiated and verified through a suitable verification system, and are considered a behavioral biometric. Authentication based on keystroke dynamics has many advantages, such as ease of data acquisition, continuous non-intrusive monitoring, and ease of integration into existing systems. In this paper, we present a convolutional neural network, which we call CNN-Detect, to detect unauthorized users that attempt to access resources by their typing patterns. We test our model on the publicly available CMU keystroke dynamics dataset, after suitable feature engineering. Our proposed model shows significant improvement over other models in the literature, achieving an average equal error rate (EER) of 0.009, and a zero-miss false acceptance rate (ZM-FAR) of 0.027.
引用
收藏
页码:209 / 216
页数:8
相关论文
共 50 条
  • [1] A novel approach for user authentication using keystroke dynamics
    Shekhawat, Kirty
    Bhatt, Devershi Pallavi
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07): : 2015 - 2027
  • [2] A machine learning approach to keystroke dynamics based user authentication
    Revett, Kenneth
    Gorunescu, Florin
    Gorunescu, Marina
    Ene, Marius
    de Magalhaes, Sergio Tenreiro
    Dinis Santos, Henrique M.
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 55 - 70
  • [3] User Authentication Using Keystroke Dynamics via Crowdsourcing
    Foresi, Andrew
    Samavi, Reza
    [J]. 2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 336 - 338
  • [4] User authentication by information source using fuzzy approach in biometric keystroke dynamics
    Hub, Miloslav
    [J]. PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, : 270 - +
  • [5] User authentication using keystroke dynamics for cellular phones
    Campisi, P.
    Maiorana, E.
    Lo Bosco, M.
    Neri, A.
    [J]. IET SIGNAL PROCESSING, 2009, 3 (04) : 333 - 341
  • [6] User Authentication with Keystroke Dynamics using Fixed Text
    Rybnik, Mariusz
    Panasiuk, Piotr
    Saeed, Khalid
    [J]. ICBAKE: 2009 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING, 2009, : 70 - +
  • [7] Online User Authentication System Using Keystroke Dynamics
    Salem, Asma
    Jabri, Ahmad Sharieh Riad
    [J]. JOURNAL OF COMPUTER SECURITY, 2023, 31 (03) : 185 - 215
  • [8] A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics
    Revett, Kenneth
    [J]. INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2009, 7 (01) : 7 - 15
  • [9] Anomaly Detection Approach to Keystroke Dynamics Based User Authentication
    Ivannikova, Elena
    David, Gil
    Hamalainen, Timo
    [J]. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 885 - 889
  • [10] A bioinformatics based approach to user authentication via keystroke dynamics
    Kenneth Revett
    [J]. International Journal of Control, Automation and Systems, 2009, 7 : 7 - 15