Skip to main content
Top

2018 | OriginalPaper | Chapter

Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods

Authors : Faisal Alshanketi, Issa Traoré, Awos Kanan, Ahmed Awad

Published in: Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Mobile keystroke dynamic biometric authentication requires several biometric samples for enrolment. In some application context or scenario where the user scarcely uses the application, it could take quite a while to get enough samples for enrolment. This creates a window of vulnerability where the user cannot be authenticated using the keystroke dynamic biometric. We propose in this paper, an adaptive approach to derive initially the user profile online and passively with a minimum number of samples, and then progressively update the profile as more samples become available. The approach uses ensemble classification methods and the equal error rate as profile maturity metric. The approach was evaluated using an existing dataset involving 42 users yielding encouraging results. The best performance achieved was an EER of 5.29% using Random forest algorithm.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)CrossRef Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)CrossRef
2.
go back to reference Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186–191, April 2016 Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186–191, April 2016
3.
go back to reference Antal, M., Szabó, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 343–350, May 2015 Antal, M., Szabó, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 343–350, May 2015
4.
go back to reference Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)CrossRef Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)CrossRef
5.
go back to reference Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)CrossRef Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)CrossRef
6.
go back to reference El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: Proceedings of the 48th IEEE International Carnahan Conference on Security Technology (2012) El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: Proceedings of the 48th IEEE International Carnahan Conference on Security Technology (2012)
7.
go back to reference Jadhav, C., Kulkami, S., Shelar, S., Shinde, K., Dharwadkar, N.V.: Biometrie authentication using keystroke dynamics. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 870–875, February 2017 Jadhav, C., Kulkami, S., Shelar, S., Shinde, K., Dharwadkar, N.V.: Biometrie authentication using keystroke dynamics. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 870–875, February 2017
8.
go back to reference Karnan, M., Krishnaraj, N.: Keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, December 2010 Karnan, M., Krishnaraj, N.: Keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, December 2010
9.
go back to reference Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 125–134, June 2009 Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 125–134, June 2009
10.
go back to reference Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud. 35(6), 859–870 (1991)CrossRef Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud. 35(6), 859–870 (1991)CrossRef
11.
go back to reference Neal, T.J., Woodard, D.L.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 1, 74–110 (2016)CrossRef Neal, T.J., Woodard, D.L.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 1, 74–110 (2016)CrossRef
12.
go back to reference Pankanti, S., Ratha, N.K., Bolle, R.M.: Structure in errors: a case study in fingerprint verification. In: Object Recognition Supported by User Interaction for Service Robots (2002) Pankanti, S., Ratha, N.K., Bolle, R.M.: Structure in errors: a case study in fingerprint verification. In: Object Recognition Supported by User Interaction for Service Robots (2002)
13.
go back to reference Woodard, D., Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)CrossRef Woodard, D., Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)CrossRef
14.
go back to reference Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009) Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:​0910.​0817 (2009)
15.
go back to reference Stefan, D., Yao, D.D.: Keystroke-dynamics authentication against synthetic forgeries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–8. IEEE (2010) Stefan, D., Yao, D.D.: Keystroke-dynamics authentication against synthetic forgeries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–8. IEEE (2010)
Metadata
Title
Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods
Authors
Faisal Alshanketi
Issa Traoré
Awos Kanan
Ahmed Awad
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-030-03712-3_4

Premium Partner