Continuous authentication by free-text keystroke based on CNN and RNN

被引:32
|
作者
Lu, Xiaofeng [1 ]
Zhang, Shengfei [1 ]
Hui, Pan [2 ]
Lio, Pietro [3 ]
机构
[1] Beijing Univ Post & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[3] Univ Cambridge, Comp Lab, Cambridge, England
基金
中国国家自然科学基金;
关键词
Authentication; Keystroke dynamics; Free-text; CNN; RNN;
D O I
10.1016/j.cose.2020.101861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Personal keystroke modes are difficult to imitate and can therefore be used for identity authentication. The keystroke habits of a person can be learned according to the keystroke data generated when the person inputs free text. Detecting a user's keystroke habits as the user enters text can continuously verify the user's identity without affecting user input. The method proposed in this paper authenticates users via their keystrokes when they type free text. The user keystroke data is divided into a fixed-length keystroke sequence, which is then converted into a keystroke vector sequence according to the time feature of the keystroke. A model that combines a convolutional neural network and a recursive neural network is used to learn a sequence of individual keystroke vectors to obtain individual keystroke features for identity authentication. The model is tested using two open datasets, and the best false rejection rate (FRR) is found to be (2.07%,6.61%), the best false acceptance rate (FAR) is found to be (3.26%, 5.31%), and the best equal error rate (EER) is found to be (2.67%, 5.97%). (C) 2020 The Author(s). Published by Elsevier Ltd.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] A Chinese Continuous Keystroke Authentication Method Using Cognitive Factors
    Lin, Tu-Liang
    Chen, Yu-Sheng
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [32] On the Design of an Authentication system based on Keystroke Dynamics Using a Predefined Input Text
    Bartmann, Dieter
    Bakdi, Idir
    Achatz, Michael
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (02) : 1 - 12
  • [33] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Imane Lamiche
    Guo Bin
    Yao Jing
    Zhiwen Yu
    Abdenour Hadid
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4417 - 4430
  • [34] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    CYBERSECURITY, 2021, 4 (01)
  • [35] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Lamiche, Imane
    Bin, Guo
    Jing, Yao
    Yu, Zhiwen
    Hadid, Abdenour
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4417 - 4430
  • [36] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    Cybersecurity, 4
  • [37] Analysis of Authentication System Based on Keystroke Dynamics
    Daribay, Amanzhol
    Obaidat, Mohammad S.
    Krishna, P. Venkata
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 226 - 231
  • [38] Keystroke dynamics-based user authentication using long and free text strings from various input devices
    Kang, Pilsung
    Cho, Sungzoon
    INFORMATION SCIENCES, 2015, 308 : 72 - 93
  • [39] Semantic Graph from Free-text
    Fatima, Arooj
    Ghazi, Arsalan
    Luca, Cristina
    2017 INTERNATIONAL CONFERENCE ON OPTIMIZATION OF ELECTRICAL AND ELECTRONIC EQUIPMENT (OPTIM) & 2017 INTL AEGEAN CONFERENCE ON ELECTRICAL MACHINES AND POWER ELECTRONICS (ACEMP), 2017, : 1132 - 1137
  • [40] Improved Keystroke Authentication Accuracy Based on Statistics and Weight
    Li Jian
    Guo Xiaojing
    Li Meiyun
    Li Ruifan
    CHINA COMMUNICATIONS, 2012, 9 (07) : 36 - 41