Skip to main content

2020 | OriginalPaper | Buchkapitel

A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics

verfasst von : Ahmet Melih Gedikli, Mehmet Önder Efe

Erschienen in: Pattern Recognition and Artificial Intelligence

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Keystroke dynamics is a widely accepted user recognition and verification behavioral biometric, which has been studied nearly for a century. Intrinsically, this biometric is used together with id/password authentication forming multi-factor authentication. There are several anomaly detection algorithms that have been proposed for this task. While some proposals handle this problem with measuring data distance by taking correlation and dependence into account, some models use complex and time-consuming models deep neural networks to train to reach the right approximation. Our paper addresses a simple, accurate and lightweight method for user authentication. We show the effectiveness of our approach through comparisons with existing methods, which have also used the CMU keystroke dynamics benchmark dataset used here too. Using feed forward multilayer neural network with resilient backpropagation, we obtained an Equal Error Rate (ERR) equal to 0.049 for authentication with overall identification accuracy of 94.7%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Kim, H.-J.: Biometrics, is it a viable proposition for identity authentication and access control? Comput. Secur. 14, 205–214 (1995)CrossRef Kim, H.-J.: Biometrics, is it a viable proposition for identity authentication and access control? Comput. Secur. 14, 205–214 (1995)CrossRef
2.
Zurück zum Zitat Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Gate to Computer Science and Research Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 1–22 (2015) Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Gate to Computer Science and Research Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 1–22 (2015)
3.
Zurück zum Zitat Dealey, W., Dvorak, A., Merrick, N., Ford, G.: Typewriting behavior (1936) Dealey, W., Dvorak, A., Merrick, N., Ford, G.: Typewriting behavior (1936)
4.
Zurück zum Zitat Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Man Mach. Stud. 28, 67–76 (1988)CrossRef Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Man Mach. Stud. 28, 67–76 (1988)CrossRef
5.
Zurück zum Zitat Goicoechea-Telleria, I., Sanchez-Reillo, R., Liu-Jimenez, J., Blanco-Gonzalo, R.: Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? Wirel. Commun. Mob. Comput. 2018, 1–16 (2018)CrossRef Goicoechea-Telleria, I., Sanchez-Reillo, R., Liu-Jimenez, J., Blanco-Gonzalo, R.: Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? Wirel. Commun. Mob. Comput. 2018, 1–16 (2018)CrossRef
6.
Zurück zum Zitat Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems. ACM Comput. Surv. 50, 1–37 (2017)CrossRef Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems. ACM Comput. Surv. 50, 1–37 (2017)CrossRef
7.
Zurück zum Zitat Garofalo, G., Rimmer, V., Hamme, T., Preuveneers, D., Joosen, W.: Fishy faces: crafting adversarial images to poison face authentication (2018) Garofalo, G., Rimmer, V., Hamme, T., Preuveneers, D., Joosen, W.: Fishy faces: crafting adversarial images to poison face authentication (2018)
8.
Zurück zum Zitat Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19, 1928 (2019)CrossRef Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19, 1928 (2019)CrossRef
9.
Zurück zum Zitat Zhou, Z., Tang, D., Wang, X., Han, W., Xiangyu, L., Zhang, K.: Invisible mask: practical attacks on face recognition with infrared (2018) Zhou, Z., Tang, D., Wang, X., Han, W., Xiangyu, L., Zhang, K.: Invisible mask: practical attacks on face recognition with infrared (2018)
10.
Zurück zum Zitat Meng, T.C., Gupta, P., Gao, D.: I can be you: questioning the use of keystroke dynamics as biometrics. In: Proceedings of the 20th Network and Distributed System Security Symposium (2013) Meng, T.C., Gupta, P., Gao, D.: I can be you: questioning the use of keystroke dynamics as biometrics. In: Proceedings of the 20th Network and Distributed System Security Symposium (2013)
11.
Zurück zum Zitat Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI (2011) Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI (2011)
12.
Zurück zum Zitat Forsen, G., Nelson, M., Staron Jr, R.: Personal attributes authentication techniques. Technical report RADC-TR-77-333, Rome Air Development Center (1977) Forsen, G., Nelson, M., Staron Jr, R.: Personal attributes authentication techniques. Technical report RADC-TR-77-333, Rome Air Development Center (1977)
13.
Zurück zum Zitat Spillane, R.: Keyboard apparatus for personal identification. IBM Tech. Disclosure Bull. 17(3346), 3346 (1975) Spillane, R.: Keyboard apparatus for personal identification. IBM Tech. Disclosure Bull. 17(3346), 3346 (1975)
14.
Zurück zum Zitat Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report Rand Rep. R-2560-NSF, RAND Corporation (1980) Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report Rand Rep. R-2560-NSF, RAND Corporation (1980)
15.
Zurück zum Zitat Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351–359 (2000)CrossRef Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351–359 (2000)CrossRef
16.
Zurück zum Zitat Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. Issues 10, 1–10 (2013) Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. Issues 10, 1–10 (2013)
17.
Zurück zum Zitat Banerjee, S.P., Woodard, D.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012) Banerjee, S.P., Woodard, D.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)
18.
Zurück zum Zitat Bhatt, S., Santhanam, T.: Keystroke dynamics for biometric authentication—a survey. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013) Bhatt, S., Santhanam, T.: Keystroke dynamics for biometric authentication—a survey. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)
19.
Zurück zum Zitat Crawford, H.: Keystroke dynamics: characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust (2010) Crawford, H.: Keystroke dynamics: characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust (2010)
20.
Zurück zum Zitat Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11, 1565–1573 (2011)CrossRef Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11, 1565–1573 (2011)CrossRef
21.
Zurück zum Zitat Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. Int. J. Comput. Sci. Inform. Secur. 5, 115–119 (2009) Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. Int. J. Comput. Sci. Inform. Secur. 5, 115–119 (2009)
22.
Zurück zum Zitat Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 1–24 (2013)CrossRef Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 1–24 (2013)CrossRef
23.
Zurück zum Zitat Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (2012) Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (2012)
24.
Zurück zum Zitat Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217–1222 (1990)CrossRef Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217–1222 (1990)CrossRef
25.
Zurück zum Zitat Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (2009) Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (2009)
26.
Zurück zum Zitat Yu, E., Cho, S.: GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the International Joint Conference on Neural Networks (2003) Yu, E., Cho, S.: GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the International Joint Conference on Neural Networks (2003)
27.
Zurück zum Zitat Souza, B., Brito, N., Neves, W., Silva, K., Lima, R., Silva, S.D.: Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines. In: 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541) (2004) Souza, B., Brito, N., Neves, W., Silva, K., Lima, R., Silva, S.D.: Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines. In: 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541) (2004)
28.
Zurück zum Zitat Prasad, N., Singh, R., Lal, S.P.: Comparison of back propagation and resilient propagation algorithm for spam classification. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013) Prasad, N., Singh, R., Lal, S.P.: Comparison of back propagation and resilient propagation algorithm for spam classification. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013)
29.
Zurück zum Zitat Swets, J.A., Pickett, R.M.: Evaluation of Diagnostic Systems: Methods from Signal Detection Theory. Academic Press, New York (1982) Swets, J.A., Pickett, R.M.: Evaluation of Diagnostic Systems: Methods from Signal Detection Theory. Academic Press, New York (1982)
30.
Zurück zum Zitat Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27, 861–874 (2006)CrossRef Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27, 861–874 (2006)CrossRef
31.
Zurück zum Zitat Deng, Y., Zhong, Y.: Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets. ISRN Signal Process. 2013, 1–7 (2013)CrossRef Deng, Y., Zhong, Y.: Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets. ISRN Signal Process. 2013, 1–7 (2013)CrossRef
32.
Zurück zum Zitat Al-Jarrah, M.: An anomaly detector for keystroke dynamics based on medians vector proximity. J. Emerg. Trends Comput. Inform. Sci. 3, 988–993 (2012) Al-Jarrah, M.: An anomaly detector for keystroke dynamics based on medians vector proximity. J. Emerg. Trends Comput. Inform. Sci. 3, 988–993 (2012)
33.
Zurück zum Zitat Maheshwary, S., Ganguly, S., Pudi, V.: Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics (2017) Maheshwary, S., Ganguly, S., Pudi, V.: Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics (2017)
34.
Zurück zum Zitat Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Proc. Comput. Sci. 135, 564–569 (2018)CrossRef Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Proc. Comput. Sci. 135, 564–569 (2018)CrossRef
35.
Zurück zum Zitat Xiaofeng, L., Shengfei, Z., Shengwei, Y.: Continuous authentication by free-text keystroke based on CNN plus RNN. Proc. Comput. Sci. 147, 314–318 (2019)CrossRef Xiaofeng, L., Shengfei, Z., Shengwei, Y.: Continuous authentication by free-text keystroke based on CNN plus RNN. Proc. Comput. Sci. 147, 314–318 (2019)CrossRef
36.
Zurück zum Zitat Baynath, P., Soyjaudah, K.M.S., Khan, M.H.-M.: Machine learning algorithm on keystroke dynamics pattern. In: 2018 IEEE Conference on Systems, Process and Control (ICSPC) (2018) Baynath, P., Soyjaudah, K.M.S., Khan, M.H.-M.: Machine learning algorithm on keystroke dynamics pattern. In: 2018 IEEE Conference on Systems, Process and Control (ICSPC) (2018)
37.
Zurück zum Zitat Chihaoui, T., Jlassi, H., Kachouri, R., Hamrouni, K., Akil, M.: Personal verification system based on retina and SURF descriptors. In: 2016 13th International Multi-Conference on Systems, Signals and Devices (SSD) (2016) Chihaoui, T., Jlassi, H., Kachouri, R., Hamrouni, K., Akil, M.: Personal verification system based on retina and SURF descriptors. In: 2016 13th International Multi-Conference on Systems, Signals and Devices (SSD) (2016)
Metadaten
Titel
A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics
verfasst von
Ahmet Melih Gedikli
Mehmet Önder Efe
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-37548-5_2