TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings

被引:0
|
作者
Lulu Yang
Chen Li
Ruibang You
Bibo Tu
Linghui Li
机构
[1] Institute of Information Engineering,
[2] Chinese Academy of Sciences,undefined
[3] School of Cyber Security,undefined
[4] University of Chinese Academy of Sciences,undefined
[5] Key Laboratory of Trustworthy Distributed Computing and Service,undefined
[6] Ministry of Education,undefined
[7] Beijing University of Posts and Telecommunications,undefined
来源
关键词
Keystroke dynamics; Continuous user authentication; Embedding; LSTM; Bi-LSTM;
D O I
暂无
中图分类号
学科分类号
摘要
Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some tasks. It remains a considerable challenge to authenticate users continuously and accurately with short keystroke inputs collected in uncontrolled settings. In this work, we propose a Timely Keystroke-based method for Continuous user Authentication, named TKCA. It integrates the key name and two kinds of timing features through an embedding mechanism. And it captures the relationship between context keystrokes by the Bidirectional Long Short-Term Memory (Bi-LSTM) network. We conduct a series of experiments to validate it on a public dataset - the Clarkson II dataset collected in a completely uncontrolled and natural setting. Experiment results show that the proposed TKCA achieves state-of-the-art performance with 8.28% of EER when using only 30 keystrokes and 2.78% of EER when using 190 keystrokes.
引用
下载
收藏
相关论文
共 50 条
  • [1] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    CYBERSECURITY, 2021, 4 (01)
  • [2] Keystroke-Based Biometric Authentication in Mobile Devices
    Urtiga, E. V. C.
    Moreno, E. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 383 - 390
  • [3] Keystroke-Based User Identification on Smart Phones
    Zahid, Saira
    Shahzad, Muhammad
    Khayam, Syed Ali
    Farooq, Muddassar
    RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2009, 5758 : 224 - 243
  • [4] Introducing touchstroke: keystroke-based authentication system for smartphones
    Kambourakis, Georgios
    Damopoulos, Dimitrios
    Papamartzivanos, Dimitrios
    Pavlidakis, Emmanouil
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 542 - 554
  • [5] Improvements to Keystroke-Based Authentication By Adding Linguistic Context
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [6] Combined Use of Pattern Recognition Algorithms for Keystroke-based Continuous Authentication System
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Arseni, Stefan C.
    Fratu, Octavian
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [7] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239
  • [8] Keystroke-based Continuous Authentication while Listening to Music on Your Smart-phone
    Primo, Abena
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 217 - 225
  • [9] Sequence Alignment of Dynamic Intervals for Keystroke Dynamics based User Authentication
    Ho, Jiacang
    Kang, Dae-Ki
    2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, : 1433 - 1438
  • [10] MLP Neural Network for Keystroke-based User Identification System
    Popovici, Eduard C.
    Guta, Ovidiu G.
    Stancu, Liviu A.
    Arseni, Stefan C.
    Fratu, Octavian
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 155 - 158