A study on continuous authentication using a combination of keystroke and mouse biometrics

被引:78
作者
Mondal, Soumik [1 ]
Bours, Patrick [1 ]
机构
[1] NTNU Norwegian Univ Sci & Technol, NISlab Norwegian Informat Secur Lab, Gjovik, Norway
关键词
Continuous authentication; Behavioural biometrics; Mouse dynamics; Keystroke dynamics; Trust model; Feature selection; Performance measure; IDENTITY VERIFICATION; USER AUTHENTICATION; DYNAMICS;
D O I
10.1016/j.neucom.2016.11.031
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we focus on a context independent continuous authentication system that reacts on every separate action performed by a user. We contribute with a robust dynamic trust model algorithm that can be applied to any continuous authentication system, irrespective of the biometric modality. We also contribute a novel performance reporting technique for continuous authentication. Our proposed approach was validated with extensive experiments with a unique behavioural biometric dataset. This dataset was collected under complete uncontrolled condition from 53 users by Using our data collection software. We considered both keystroke and mouse usage behaviour patterns to prevent a situation where an attacker avoids detection by restricting to one input device because the system only checks the other input device. During our research, we developed a feature selection technique that could be applied to other pattern recognition problems. The best result obtained in this research is that 50 out of 53 genuine users are never inadvertently locked out by the system, while the remaining 3 genuine users (i.e. 5.7%) are sometimes locked out, on average after 2265 actions. Furthermore, there are only 3 out of 2756 impostors not been detected, i.e. only 0.1% of the impostors go undetected. Impostors are detected on average after 252 actions.
引用
收藏
页码:1 / 22
页数:22
相关论文
共 52 条
  • [1] Biometric Recognition Based on Free-Text Keystroke Dynamics
    Ahmed, Ahmed A.
    Traore, Issa
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2014, 44 (04) : 458 - 472
  • [2] A new biometric technology based on mouse dynamics
    Ahmed, Ahmed Awad E.
    Traore, Issa
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2007, 4 (03) : 165 - 179
  • [3] Al Solami E., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P229, DOI 10.1109/ICNSS.2011.6060005
  • [4] [Anonymous], IEEE 2012 IEEE INT J
  • [5] [Anonymous], J UNDERGRAD RES
  • [6] [Anonymous], 2012, INF SECUR TECH REP, DOI [DOI 10.1016/J.ISTR.2012.02.001, 10.1016/j.istr.2012.02.001]
  • [7] [Anonymous], THESIS
  • [8] [Anonymous], THESIS
  • [9] [Anonymous], CHAPTER DEV NEXT GEN
  • [10] User authentication through typing biometrics features
    Araújo, LCF
    Sucupira, LHR
    Lizárraga, MG
    Ling, LL
    Yabu-Uti, JBT
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2005, 53 (02) : 851 - 855