A decision-making framework for user authentication using keystroke dynamics

被引:0
作者
Medvedev, Viktor [1 ]
Budzys, Arnoldas [1 ]
Kurasova, Olga [1 ]
机构
[1] Vilnius Univ, Inst Data Sci & Digital Technol, Fac Math & Informat, Akad Str 4, LT-08412 Vilnius, Lithuania
关键词
Cybersecurity; Keystroke dynamics; User authentication; Deep learning; Intrusion detection; Data fusion; SECURITY;
D O I
10.1016/j.cose.2025.104494
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Increasingly sophisticated cyber attacks threaten critical infrastructures, requiring more trusted user authentication mechanisms. In this work, we propose a deep learning-based user authentication framework that combines keystroke dynamics with Siamese neural networks to differentiate legitimate users from impostors. A key challenge in this area is the variability in password lengths, which leads to different feature sizes and complicates model training. Our approach uses interpolation-based data fusion strategies to standardize the number of keystroke features, ensuring consistency across different datasets and password lengths. Through experiments on the fused CMU and KeyRecs datasets, we have evaluated the effectiveness of the proposed decision-making framework with adaptive threshold strategies. The threshold strategy determines how the final decision boundary is set with respect to the user's baseline typing behavior. We empirically evaluated the framework on fused data, achieving an equal error rate as low as 0.11-0.12, indicating strong efficacy in detecting insider threats. We show how the obtained Siamese neural network with triplet loss function can be used to distinguish genuine users from impostors even under different input conditions, contributing to more robust and scalable intrusion detection systems.
引用
收藏
页数:12
相关论文
共 35 条
[1]   TypeNet: Deep Learning Keystroke Biometrics [J].
Acien, Alejandro ;
Morales, Aythami ;
Monaco, John V. ;
Vera-Rodriguez, Ruben ;
Fierrez, Julian .
IEEE TRANSACTIONS ON BIOMETRICS, BEHAVIOR, AND IDENTITY SCIENCE, 2022, 4 (01) :57-70
[2]   Comprehensive survey: Biometric user authentication application, evaluation, and discussion [J].
Alrawili, Reem ;
AlQahtani, Ali Abdullah S. ;
Khan, Muhammad Khurram .
COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
[3]   Dimension Reduction of Multidimensional Structured and Unstructured Datasets through Ensemble Learning of Neural Embeddings [J].
Alvarado-Perez, Juan Carlos ;
Garcia, Miguel Angel ;
Puig, Domenec .
ADVANCED INTELLIGENT SYSTEMS, 2024, 6 (11)
[4]   Passphrase and keystroke dynamics authentication: Usable security [J].
Bhana, Bhaveer ;
Flowerday, Stephen .
COMPUTERS & SECURITY, 2020, 96
[5]   CLICKA: Collecting and leveraging identity cues with keystroke dynamics [J].
Buckley, Oliver ;
Hodges, Duncan ;
Windle, Jonathan ;
Earl, Sally .
COMPUTERS & SECURITY, 2022, 120
[6]  
Budzys Arnoldas, 2023, HCI for Cybersecurity, Privacy and Trust: 5th International Conference, HCI-CPT 2023, Held as Part of the 25th HCI International Conference, HCII 2023, Proceedings. Lecture Notes in Computer Science (14045), P309, DOI 10.1007/978-3-031-35822-7_21
[7]   Integrating deep learning and data fusion for advanced keystroke dynamics authentication [J].
Budzys, Arnoldas ;
Kurasova, Olga ;
Medvedev, Viktor .
COMPUTER STANDARDS & INTERFACES, 2025, 92
[8]   Deep learning-based authentication for insider threat detection in critical infrastructure [J].
Budzys, Arnoldas ;
Kurasova, Olga ;
Medvedev, Viktor .
ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (10)
[9]  
Çeker H, 2017, IEEE INT WORKS INFOR
[10]   Personalized Keystroke Dynamics for Self-Powered Human-Machine Interfacing [J].
Chen, Jun ;
Zhu, Guang ;
Yang, Jin ;
Jing, Qingshen ;
Bai, Peng ;
Yang, Weiqing ;
Qi, Xuewei ;
Su, Yuanjie ;
Wang, Zhong Lin .
ACS NANO, 2015, 9 (01) :105-116