Outlier detection for keystroke biometric user authentication

被引:0
|
作者
Ismail, Mahmoud G. [1 ]
Salem, Mohammed A. -M. [1 ]
Abd El Ghany, Mohamed A. [2 ,3 ]
Aldakheel, Eman Abdullah [4 ]
Abbas, Safia [5 ]
机构
[1] German Univ Cairo, Fac Media Engn & Technol, Cairo, Egypt
[2] German Univ Cairo, Elect Dept, Cairo, Egypt
[3] Tech Univ Darmstadt, Integrated Elect Syst Lab, Darmstadt, Germany
[4] Princess Nourah Bint Abdulrahman Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh, Saudi Arabia
[5] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo, Egypt
关键词
Keystroke biometrics; Machine learning; Outlier detection; User authentication; Histogram-based outlier score; Carnegie Mellon University's (CMU) keystroke biometric dataset;
D O I
10.7717/peerj-cs.2086
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
User authentication is a fundamental aspect of information security, requiring robust measures against identity fraud and data breaches. In the domain of keystroke dynamics research, a significant challenge lies in the reliance on imposter datasets, particularly evident in real -world scenarios where obtaining authentic imposter data is exceedingly difficult. This article presents a novel approach to keystroke dynamics -based authentication, utilizing unsupervised outlier detection techniques, notably exemplified by the histogram -based outlier score (HBOS), eliminating the necessity for imposter samples. A comprehensive evaluation, comparing HBOS with 15 alternative outlier detection methods, highlights its superior performance. This departure from traditional dependence on imposter datasets signifies a substantial advancement in keystroke dynamics research. Key innovations include the introduction of an alternative outlier detection paradigm with HBOS, increased practical applicability by reducing reliance on extensive imposter data, resolution of real -world challenges in simulating fraudulent keystrokes, and addressing critical gaps in existing authentication methodologies. Rigorous testing on Carnegie Mellon University's (CMU) keystroke biometrics dataset validates the effectiveness of the proposed approach, yielding an impressive equal error rate (EER) of 5.97%, a notable area under the ROC curve of 97.79%, and a robust accuracy (ACC) of 89.23%. This article represents a significant advancement in keystroke dynamics -based authentication, offering a reliable and efficient solution characterized by substantial improvements in accuracy and practical applicability.
引用
收藏
页数:21
相关论文
共 50 条
  • [21] Age detection through keystroke dynamics from user authentication failures
    Tsimperidis I.
    Rostami S.
    Katos V.
    International Journal of Digital Crime and Forensics, 2017, 9 (01) : 1 - 16
  • [22] A Hybrid Method for Keystroke Biometric User Identification
    Ali, Md L.
    Thakur, Kutub
    Obaidat, Muath A.
    ELECTRONICS, 2022, 11 (17)
  • [23] Behavioral biometric authentication on smartphone using keystroke dynamics
    Vaishnav, Pragya
    Kaushik, Manju
    Raja, Linesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (02): : 591 - 600
  • [24] On Neural Networks for Biometric Authentication Based on Keystroke Dynamics
    Lin, Chu-Hsing
    Liu, Jung-Chun
    Lee, Ken-Yu
    SENSORS AND MATERIALS, 2018, 30 (03) : 385 - 396
  • [25] Authentication and Identification Methods Used in Keystroke Biometric Systems
    Ali, Md Liakat
    Tappert, Charles C.
    Qiu, Meikang
    Monaco, John V.
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
  • [26] Biometric personal authentication using keystroke dynamics: A review
    Karnan, M.
    Akila, M.
    Krishnaraj, N.
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 1565 - 1573
  • [27] Keystroke-Based Biometric Authentication in Mobile Devices
    Urtiga, E. V. C.
    Moreno, E. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 383 - 390
  • [28] A Comparison of Keystroke Dynamics Techniques for User Authentication
    Anusas-amornkul, Tanapat
    Wangsuk, Kasem
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 45 - 49
  • [29] The reliability of user authentication through keystroke dynamics
    Douhou, Salima
    Magnus, Jan R.
    STATISTICA NEERLANDICA, 2009, 63 (04) : 432 - 449
  • [30] User Authentication based on Dynamic Keystroke Recognition
    Fouad, Khaled Mohammed
    Hassan, Basma Mohammed
    Hassan, Mahmoud F.
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2016, 7 (02) : 1 - 32