Skip to main content

2018 | OriginalPaper | Buchkapitel

Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods

verfasst von : Faisal Alshanketi, Issa Traoré, Awos Kanan, Ahmed Awad

Erschienen in: Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile keystroke dynamic biometric authentication requires several biometric samples for enrolment. In some application context or scenario where the user scarcely uses the application, it could take quite a while to get enough samples for enrolment. This creates a window of vulnerability where the user cannot be authenticated using the keystroke dynamic biometric. We propose in this paper, an adaptive approach to derive initially the user profile online and passively with a minimum number of samples, and then progressively update the profile as more samples become available. The approach uses ensemble classification methods and the equal error rate as profile maturity metric. The approach was evaluated using an existing dataset involving 42 users yielding encouraging results. The best performance achieved was an EER of 5.29% using Random forest algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)CrossRef Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)CrossRef
2.
Zurück zum Zitat Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186–191, April 2016 Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186–191, April 2016
3.
Zurück zum Zitat Antal, M., Szabó, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 343–350, May 2015 Antal, M., Szabó, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 343–350, May 2015
4.
Zurück zum Zitat Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)CrossRef Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)CrossRef
5.
Zurück zum Zitat Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)CrossRef Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)CrossRef
6.
Zurück zum Zitat El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: Proceedings of the 48th IEEE International Carnahan Conference on Security Technology (2012) El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: Proceedings of the 48th IEEE International Carnahan Conference on Security Technology (2012)
7.
Zurück zum Zitat Jadhav, C., Kulkami, S., Shelar, S., Shinde, K., Dharwadkar, N.V.: Biometrie authentication using keystroke dynamics. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 870–875, February 2017 Jadhav, C., Kulkami, S., Shelar, S., Shinde, K., Dharwadkar, N.V.: Biometrie authentication using keystroke dynamics. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 870–875, February 2017
8.
Zurück zum Zitat Karnan, M., Krishnaraj, N.: Keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, December 2010 Karnan, M., Krishnaraj, N.: Keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, December 2010
9.
Zurück zum Zitat Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 125–134, June 2009 Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 125–134, June 2009
10.
Zurück zum Zitat Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud. 35(6), 859–870 (1991)CrossRef Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud. 35(6), 859–870 (1991)CrossRef
11.
Zurück zum Zitat Neal, T.J., Woodard, D.L.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 1, 74–110 (2016)CrossRef Neal, T.J., Woodard, D.L.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 1, 74–110 (2016)CrossRef
12.
Zurück zum Zitat Pankanti, S., Ratha, N.K., Bolle, R.M.: Structure in errors: a case study in fingerprint verification. In: Object Recognition Supported by User Interaction for Service Robots (2002) Pankanti, S., Ratha, N.K., Bolle, R.M.: Structure in errors: a case study in fingerprint verification. In: Object Recognition Supported by User Interaction for Service Robots (2002)
13.
Zurück zum Zitat Woodard, D., Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)CrossRef Woodard, D., Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)CrossRef
14.
Zurück zum Zitat Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009) Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:​0910.​0817 (2009)
15.
Zurück zum Zitat Stefan, D., Yao, D.D.: Keystroke-dynamics authentication against synthetic forgeries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–8. IEEE (2010) Stefan, D., Yao, D.D.: Keystroke-dynamics authentication against synthetic forgeries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–8. IEEE (2010)
Metadaten
Titel
Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods
verfasst von
Faisal Alshanketi
Issa Traoré
Awos Kanan
Ahmed Awad
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-03712-3_4