Continuous authentication by free-text keystroke based on CNN and RNN

被引:32
|
作者
Lu, Xiaofeng [1 ]
Zhang, Shengfei [1 ]
Hui, Pan [2 ]
Lio, Pietro [3 ]
机构
[1] Beijing Univ Post & Telecommun, Sch Cyberspace Secur, Beijing, Peoples R China
[2] Hong Kong Univ Sci & Technol, Hong Kong, Peoples R China
[3] Univ Cambridge, Comp Lab, Cambridge, England
基金
中国国家自然科学基金;
关键词
Authentication; Keystroke dynamics; Free-text; CNN; RNN;
D O I
10.1016/j.cose.2020.101861
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Personal keystroke modes are difficult to imitate and can therefore be used for identity authentication. The keystroke habits of a person can be learned according to the keystroke data generated when the person inputs free text. Detecting a user's keystroke habits as the user enters text can continuously verify the user's identity without affecting user input. The method proposed in this paper authenticates users via their keystrokes when they type free text. The user keystroke data is divided into a fixed-length keystroke sequence, which is then converted into a keystroke vector sequence according to the time feature of the keystroke. A model that combines a convolutional neural network and a recursive neural network is used to learn a sequence of individual keystroke vectors to obtain individual keystroke features for identity authentication. The model is tested using two open datasets, and the best false rejection rate (FRR) is found to be (2.07%,6.61%), the best false acceptance rate (FAR) is found to be (3.26%, 5.31%), and the best equal error rate (EER) is found to be (2.67%, 5.97%). (C) 2020 The Author(s). Published by Elsevier Ltd.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] Roman Urdu Headline News Text Classification Using RNN, LSTM and CNN
    Kandhro, Irfan Ali
    Jumani, Sahar Zafar
    Kumar, Kamlash
    Hafeez, Abdul
    Ali, Fayyaz
    ADVANCES IN DATA SCIENCE AND ADAPTIVE ANALYSIS, 2020, 12 (02)
  • [42] An Exploration of Keystroke Dynamics Authentication using Non-fixed Text of Various Length
    Rybnik, Mariusz
    Tabedzki, Marek
    Adamski, Marcin
    Saeed, Khalid
    2013 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING (ICBAKE), 2013, : 245 - 250
  • [43] A Generic Privacy-preserving Protocol for Keystroke Dynamics-based Continuous Authentication
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 491 - 498
  • [44] Continuous User Authentication Featuring Keystroke Dynamics Based on Robust Recurrent Confidence Model and Ensemble Learning Approach
    Kiyani, Anum Tanveer
    Lasebae, Aboubaker
    Ali, Kamran
    Rehman, Masood Ur
    Haq, Bushra
    IEEE ACCESS, 2020, 8 : 156177 - 156189
  • [45] Combined Use of Pattern Recognition Algorithms for Keystroke-based Continuous Authentication System
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Arseni, Stefan C.
    Fratu, Octavian
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [46] Continuous Keystroke Dynamics-Based User Authentication Using Modified Hausdorff Distance
    Zhuravskii, Maksim
    Kazachuk, Maria
    Petrovskiy, Mikhail
    Mashechkin, Igor
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 : 223 - 236
  • [47] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,
  • [48] A study on continuous authentication using a combination of keystroke and mouse biometrics
    Mondal, Soumik
    Bours, Patrick
    NEUROCOMPUTING, 2017, 230 : 1 - 22
  • [49] Keystroke Dynamics-Based Authentication Using Unique Keypad
    Choi, Maro
    Lee, Shincheol
    Jo, Minjae
    Shin, Ji Sun
    SENSORS, 2021, 21 (06)
  • [50] Keystroke dynamics based biometric authentication: A hybrid classifier approach
    Dwivedi, Chaitanya
    Kalra, Divyanshu
    Naidu, Divesh
    Aggarwal, Swati
    2018 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (IEEE SSCI), 2018, : 266 - 273