Sensitivity Analysis in Keystroke Dynamics using Convolutional Neural Networks

被引:0
作者
Ceker, Hayreddin [1 ]
Upadhyaya, Shambhu [1 ]
机构
[1] Univ Buffalo, Dept Comp Sci & Engn, Buffalo, NY 14260 USA
来源
2017 IEEE WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS) | 2017年
关键词
Behavioral biometrics; convolutional neural network; data augmentation; deep learning; keystroke dynamics;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Biometrics has become ubiquitous and spurred common use in many authentication mechanisms. Keystroke dynamics is a form of behavioral biometrics that can be used for user authentication while actively working at a terminal. The proposed mechanisms involve digraph, trigraph and n-graph analysis as separate solutions or suggest a fusion mechanism with certain limitations. However, deep learning can be used as a unifying machine learning technique that consolidates the power of all different features since it has shown tremendous results in image recognition and natural language processing. In this paper, we investigate the applicability of deep learning on three different datasets by using convolutional neural networks and Gaussian data augmentation technique. We achieve 10% higher accuracy and 7.3% lower equal error rate ( EER) than existing methods. Also, our sensitivity analysis indicates that the convolution operation and the fully-connected layer are the most prominent factors that affect the accuracy and the convergence rate of a network trained with keystroke data.
引用
收藏
页数:6
相关论文
共 28 条
[1]  
[Anonymous], 2014, P COLING 2014 25 INT, DOI DOI 10.1109/ICCAR.2017.7942788
[2]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[3]  
Ceker H., 2016, IEEE 8 INT C BIOM TH
[4]  
Çeker H, 2015, IEEE MILIT COMMUN C, P1305, DOI 10.1109/MILCOM.2015.7357625
[5]   Applying hidden Markov models to keystroke pattern analysis for password verification [J].
Chen, W ;
Chang, WD .
PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, :467-474
[6]  
Collobert R, 2011, J MACH LEARN RES, V12, P2493
[7]  
Cope B. J. B., 1990, Electrotechnology, V18, P71
[8]   An introduction to ROC analysis [J].
Fawcett, Tom .
PATTERN RECOGNITION LETTERS, 2006, 27 (08) :861-874
[9]  
Giot R., 2012, WEB BASED BENCHMARK
[10]  
Giot R, 2009, IEEE 3 INT C BIOM TH