Outlier detection for keystroke biometric user authentication

被引:0
|
作者
Ismail M.G. [1 ]
Salem M.A.-M. [1 ]
El Ghany M.A.A. [2 ,3 ]
Aldakheel E.A. [4 ]
Abbas S. [5 ]
机构
[1] Faculty of Media Engineering and Technology, German University in Cairo, Cairo
[2] Electronics Department, German University in Cairo, Cairo
[3] Integrated Electronic Systems Lab, Technische Universität Darmstadt, Darmstadt
[4] Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah Bint Abdulrahman University, Riyadh
[5] Department of Computer Sciences, Faculty of Computer and Information Sciences, Ain Shams University, Cairo
关键词
Carnegie Mellon University's (CMU) keystroke biometric dataset; Histogram-based outlier score; Keystroke biometrics; Machine learning; Outlier detection; User authentication;
D O I
10.7717/PEERJ-CS.2086
中图分类号
学科分类号
摘要
User authentication is a fundamental aspect of information security, requiring robust measures against identity fraud and data breaches. In the domain of keystroke dynamics research, a significant challenge lies in the reliance on imposter datasets, particularly evident in real-world scenarios where obtaining authentic imposter data is exceedingly difficult. This article presents a novel approach to keystroke dynamics-based authentication, utilizing unsupervised outlier detection techniques, notably exemplified by the histogram-based outlier score (HBOS), eliminating the necessity for imposter samples. A comprehensive evaluation, comparing HBOS with 15 alternative outlier detection methods, highlights its superior performance. This departure from traditional dependence on imposter datasets signifies a substantial advancement in keystroke dynamics research. Key innovations include the introduction of an alternative outlier detection paradigm with HBOS, increased practical applicability by reducing reliance on extensive imposter data, resolution of real-world challenges in simulating fraudulent keystrokes, and addressing critical gaps in existing authentication methodologies. Rigorous testing on Carnegie Mellon University's (CMU) keystroke biometrics dataset validates the effectiveness of the proposed approach, yielding an impressive equal error rate (EER) of 5.97%, a notable area under the ROC curve of 97.79%, and a robust accuracy (ACC) of 89.23%. This article represents a significant advancement in keystroke dynamics-based authentication, offering a reliable and efficient solution characterized by substantial improvements in accuracy and practical applicability. © 2024 G. Ismail et al.
引用
收藏
相关论文
共 50 条
  • [21] Age detection through keystroke dynamics from user authentication failures
    Tsimperidis I.
    Rostami S.
    Katos V.
    International Journal of Digital Crime and Forensics, 2017, 9 (01) : 1 - 16
  • [22] A Hybrid Method for Keystroke Biometric User Identification
    Ali, Md L.
    Thakur, Kutub
    Obaidat, Muath A.
    ELECTRONICS, 2022, 11 (17)
  • [23] Behavioral biometric authentication on smartphone using keystroke dynamics
    Vaishnav, Pragya
    Kaushik, Manju
    Raja, Linesh
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (02): : 591 - 600
  • [24] On Neural Networks for Biometric Authentication Based on Keystroke Dynamics
    Lin, Chu-Hsing
    Liu, Jung-Chun
    Lee, Ken-Yu
    SENSORS AND MATERIALS, 2018, 30 (03) : 385 - 396
  • [25] Authentication and Identification Methods Used in Keystroke Biometric Systems
    Ali, Md Liakat
    Tappert, Charles C.
    Qiu, Meikang
    Monaco, John V.
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1424 - 1429
  • [26] Keystroke-Based Biometric Authentication in Mobile Devices
    Urtiga, E. V. C.
    Moreno, E. D.
    IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 383 - 390
  • [27] Biometric personal authentication using keystroke dynamics: A review
    Karnan, M.
    Akila, M.
    Krishnaraj, N.
    APPLIED SOFT COMPUTING, 2011, 11 (02) : 1565 - 1573
  • [28] A Comparison of Keystroke Dynamics Techniques for User Authentication
    Anusas-amornkul, Tanapat
    Wangsuk, Kasem
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 45 - 49
  • [29] The reliability of user authentication through keystroke dynamics
    Douhou, Salima
    Magnus, Jan R.
    STATISTICA NEERLANDICA, 2009, 63 (04) : 432 - 449
  • [30] User Authentication based on Dynamic Keystroke Recognition
    Fouad, Khaled Mohammed
    Hassan, Basma Mohammed
    Hassan, Mahmoud F.
    INTERNATIONAL JOURNAL OF AMBIENT COMPUTING AND INTELLIGENCE, 2016, 7 (02) : 1 - 32