Fast Continuous User Authentication using Distance Metric Fusion of Free-text Keystroke Data

被引:6
作者
Ayotte, Blaine [1 ]
Huang, Jiaju [1 ]
Banavar, Mahesh K. [1 ]
Hou, Daqing [1 ]
Schuckers, Stephanie [1 ]
机构
[1] Clarkson Univ, Dept Elect & Comp Engn, 8 Clarkson Ave, Potsdam, NY 13699 USA
来源
2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION WORKSHOPS (CVPRW 2019) | 2019年
基金
美国国家科学基金会;
关键词
DYNAMICS;
D O I
10.1109/CVPRW.2019.00292
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Keystroke dynamics are a powerful behavioral biometric capable of determining user identity and for continuous authentication. It is an unobtrusive method that can complement an existing security system such as a password scheme and provides continuous user authentication. Existing methods record all keystrokes and use n-graphs that measure the timing between consecutive keystrokes to distinguish between users. Current state-of-the-art algorithms report EER's of 7.5% or higher with 1000 characters. With 1000 characters it takes a longer time to detect an imposter and significant damage could be done. In this paper, we investigate how quickly a user is authenticated or how many digraphs are required to accurately detect an imposter in an uncontrolled free-text environment. We present and evaluate the effectiveness of three distance metrics individually and fused with each other. We show that with just 100 digraphs, about the length of a single sentence, we achieve an EER of 35.3%. At 200 digraphs the EER drops to 15.3%. With more digraphs, the performance continues to steadily improve. With 1000 digraphs the EER drops to 3.6% which is an improvement over the state-of-the-art.
引用
收藏
页码:2380 / 2388
页数:9
相关论文
共 26 条
[1]  
[Anonymous], P STUD FAC RES DAY
[2]  
[Anonymous], SCIPY OPEN SOURCE SC
[3]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[4]  
Bellemare M.G, 2017, arXiv
[5]  
Burnett M., 2011, 10000 TOP PASSWORDS
[6]  
Corder G.W., 2014, Nonparametric Statistics: A Step-by-Step Approach, V2nd ed.
[7]  
Davoudi H., 2009, 2009 14th International CSI Computer Conference (CSICC 2009) (Postponed from July 2009), P570, DOI 10.1109/CSICC.2009.5349640
[8]  
Gessler K., 2016, Stop mindlessly following character count recommendations on facebook posts
[9]  
Gunetti D., 2005, ACM Transactions on Information and Systems Security, V8, P312, DOI 10.1145/1085126.1085129
[10]   Evolution and Diversity of the Antimicrobial Resistance Associated Mobilome in Streptococcus suis: A Probable Mobile Genetic Elements Reservoir for Other Streptococci [J].
Huang, Jinhu ;
Ma, Jiale ;
Shang, Kexin ;
Hu, Xiao ;
Liang, Yuan ;
Li, Daiwei ;
Wu, Zuowei ;
Dai, Lei ;
Chen, Li ;
Wang, Liping .
FRONTIERS IN CELLULAR AND INFECTION MICROBIOLOGY, 2016, 6