Sequence Alignment of Dynamic Intervals for Keystroke Dynamics based User Authentication

被引:0
|
作者
Ho, Jiacang [1 ]
Kang, Dae-Ki [2 ]
机构
[1] Dongseo Univ, Dept Ubiquitous IT, Grad Sch, Busan 617716, South Korea
[2] Dongseo Univ, Div Comp & Informat Engn, Busan 617716, South Korea
来源
2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS) | 2014年
关键词
keystroke dynamics; sequence alignment; authentication; dynamic intervals; IDENTITY VERIFICATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Due to the widespread use of cloud systems nowadays, strong authentication mechanisms are needed in order to secure personal files. Out of diverse ways to improve secure authentication, keystroke dynamics is of interest because it is inexpensive and needs no extra hardware systems. Furthermore, authentication systems with proper machine learning algorithms can acquire humans' typical typing behaviors from their keystroke dynamics, which entails difficulty for imposters to imitate a legitimate user's typing behavior. In this paper, we introduce sequence alignment algorithm with dynamic interval features (SADI) from keystrokes to model behavior-based authentication system. An interval feature is basically the length of each attribute label and it is used in a sequence alignment algorithm to divide every attribute into sections. However, dynamic interval features, proposed in this research, are similar to interval feature but they divide every attribute into different number of sections. Dynamic interval features are chosen to maximize comparison capability of similarity measures from keystroke data. Experimental results on the CMU public benchmark dataset indicate that the proposed SADI is comparable to and sometimes outperforms other published methods.
引用
收藏
页码:1433 / 1438
页数:6
相关论文
共 50 条
  • [21] Keystroke Dynamics for Biometric Authentication - A Survey
    Bhatt, Shanthi
    Santhanam, T.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [22] Analysis of Authentication System Based on Keystroke Dynamics
    Daribay, Amanzhol
    Obaidat, Mohammad S.
    Krishna, P. Venkata
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 226 - 231
  • [23] A novel approach for user authentication using keystroke dynamics
    Shekhawat, Kirty
    Bhatt, Devershi Pallavi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07) : 2015 - 2027
  • [24] User Authentication Using Keystroke Dynamics via Crowdsourcing
    Foresi, Andrew
    Samavi, Reza
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 336 - 338
  • [25] High Security User Authentication Based on Piezoelectric Keystroke Dynamics Applying to Multiple Emotional Responses
    Jia, Weichen
    Qi, Yuqing
    Huang, Anbiao
    Zhou, Fuqiang
    Gao, Shuo
    IEEE SENSORS JOURNAL, 2022, 22 (03) : 2814 - 2822
  • [26] Piezoelectric and Machine Learning Based Keystroke Dynamics for Highly Secure User Authentication
    Tang, Chenyu
    Cui, Ziang
    Chu, Meng
    Lu, Yujiao
    Zhou, Fuqiang
    Gao, Shuo
    IEEE SENSORS JOURNAL, 2023, 23 (20) : 24070 - 24077
  • [27] Keystroke Dynamics Support for Authentication
    Patel, Mayank Sachan Sardar
    Joshi, Padmaja
    Patel, Nataasha Raul Sardar
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 186 - 191
  • [28] Unconstrained keystroke dynamics authentication with shared secret
    Giot, Romain
    El-Abed, Mohamad
    Hemery, Baptiste
    Rosenberger, Christophe
    COMPUTERS & SECURITY, 2011, 30 (6-7) : 427 - 445
  • [29] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,
  • [30] User authentication by information source using fuzzy approach in biometric keystroke dynamics
    Hub, Miloslav
    PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, : 270 - +