Keystroke based User Authentication using Modified Differential Evolution

被引:0
作者
Krishna, Gutha Jaya [1 ,2 ]
Ravi, Vadlamani [1 ]
机构
[1] Inst Dev & Res Banking Technol, Ctr Excellence Analyt, Castle Hills Rd 1, Hyderabad 500057, India
[2] Univ Hyderabad, SCIS, Hyderabad 500046, India
来源
PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY | 2019年
关键词
Keystroke Dynamics; User Authentication; Modified Differential Evolution; Subspace Anomaly Detection; OUTLIER DETECTION;
D O I
10.1109/tencon.2019.8929371
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
User Authentication is a difficult problem yet to be addressed accurately. Little or no work is reported in literature dealing with clustering-based anomaly detection techniques for user authentication for keystroke data. Therefore, in this paper, Modified Differential Evolution (MDE) based subspace anomaly detection technique is proposed for user authentication in the context of behavioral biometrics using keystroke dynamics features. Thus, user authentication is posed as an anomaly detection problem. Anomalies in CMU's keystroke dynamics dataset are identified using subspace-based and distance-based techniques. It is observed that, among the proposed techniques, MDE based subspace anomaly detection technique yielded the highest Area Under ROC Curve (AUC) for user authentication problem. We also performed a Wilcoxon Signed Rank statistical test to corroborate our results statistically.
引用
收藏
页码:739 / 744
页数:6
相关论文
共 19 条
  • [1] Aggarwal C., 2001, On the Surprising Behavior of Distance Metrics in High Dimensional Space Database Theory - ICDT 2001, V1973, P420
  • [2] Aggarwal C. C., 2001, SIGMOD Record, V30, P37, DOI 10.1145/376284.375668
  • [3] Al-Jarrah M. M., 2010, J EMERG TRENDS COMPU, V3, P988
  • [4] On the discriminability of keystroke feature vectors used in fixed text keystroke authentication
    Balagani, Kiran S.
    Phoha, Vir V.
    Ray, Asok
    Phoha, Shashi
    [J]. PATTERN RECOGNITION LETTERS, 2011, 32 (07) : 1070 - 1080
  • [5] Bhagwati JN, 2016, WORLD TRADE SYSTEM: TRENDS AND CHALLENGES, P1
  • [6] Task Allocation and Path Planning for Collaborative Autonomous Underwater Vehicles Operating through an Underwater Acoustic Network
    Deng, Yueyue
    Beaujean, Pierre-Philippe J.
    An, Edgar
    Carlson, Edward
    [J]. JOURNAL OF ROBOTICS, 2013, 2013
  • [7] Gaines R.Stockton., 1980, Authentication by keystroke timing: Some preliminary results
  • [8] A review on the public benchmark databases for static keystroke dynamics
    Giot, Romain
    Dorizzi, Bernadette
    Rosenberger, Christophe
    [J]. COMPUTERS & SECURITY, 2015, 55 : 46 - 61
  • [9] A survey of outlier detection methodologies
    Hodge V.J.
    Austin J.
    [J]. Artificial Intelligence Review, 2004, 22 (2) : 85 - 126
  • [10] IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES
    JOYCE, R
    GUPTA, G
    [J]. COMMUNICATIONS OF THE ACM, 1990, 33 (02) : 168 - 176