One-Class Models for Continuous Authentication Based on Keystroke Dynamics

被引:4
作者
Kazachuk, Maria [1 ]
Kovalchuk, Alexander [1 ]
Mashechkin, Igor [1 ]
Orpanen, Igor [1 ]
Petrovskiy, Mikhail [1 ]
Popov, Ivan [1 ]
Zakliakov, Roman [1 ]
机构
[1] Lomonosov Moscow State Univ, MSU, Dept Comp Sci, Moscow 119899, Russia
来源
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2016 | 2016年 / 9937卷
关键词
Keystroke dynamics; User authentication; Kolmogorov-Smirnov test; Quantile discretization; Fuzzy classification; Random forest regression classification;
D O I
10.1007/978-3-319-46257-8_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper we discuss an applied problem of continuous user authentication based on keystroke dynamics. It is important for a user model to discover new intruders. That means we don't have the keystroke samples of such intruders on the training phase. It leads us to the necessity of using one-class models. In the paper we review some popular feature extraction, preprocessing and one-class classification methods for this problem. We propose a new approach to reduce dimensionality of a feature space based on two-sample Kolmogorov-Smirnov test and investigate how the quantile- based discretization technique can improve the one-class models' performance. We present two algorithms, which have not been used for keystroke dynamics before: Fuzzy kernel-based classifier and Random Forest Regression classifier. We conduct experimental evaluation of the proposed approach.
引用
收藏
页码:416 / 425
页数:10
相关论文
共 16 条
[1]  
Al Solami E., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P229, DOI 10.1109/ICNSS.2011.6060005
[2]  
Alsultan A., 2013, International Journal of Computer Science Issues (IJCSI), V10, P1
[3]   User identification and authentication using multi-modal behavioral biometrics [J].
Bailey, Kyle O. ;
Okolica, James S. ;
Peterson, Gilbert L. .
COMPUTERS & SECURITY, 2014, 43 :77-89
[4]  
Çeker H, 2015, IEEE MILIT COMMUN C, P1305, DOI 10.1109/MILCOM.2015.7357625
[5]  
CHANDRASEKAR V, 2015, MIDDLE-EAST J SCI RE, V23, P1626, DOI DOI 10.5829/idosi.mejsr.2015.23.08.22413
[6]   Java']Java-based Internet biometric authentication system [J].
Everitt, RAJ ;
McOwan, PW .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2003, 25 (09) :1166-1172
[7]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[8]  
Hastie T., 2009, The Elements of Statistical Learning: Data Mining, Inference and Prediction, V2, P1
[9]  
Hawkins S., 2002, Data Warehousing and Knowledge Discovery. 4th International Conference, DaWaK 2002. Proceedings (Lecture Notes in Computer Science Vol.2454), P170
[10]   Kernel PCA for novelty detection [J].
Hoffmann, Heiko .
PATTERN RECOGNITION, 2007, 40 (03) :863-874