Keystroke based User Authentication using Modified Differential Evolution

被引:0
作者
Krishna, Gutha Jaya [1 ,2 ]
Ravi, Vadlamani [1 ]
机构
[1] Inst Dev & Res Banking Technol, Ctr Excellence Analyt, Castle Hills Rd 1, Hyderabad 500057, India
[2] Univ Hyderabad, SCIS, Hyderabad 500046, India
来源
PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY | 2019年
关键词
Keystroke Dynamics; User Authentication; Modified Differential Evolution; Subspace Anomaly Detection; OUTLIER DETECTION;
D O I
10.1109/tencon.2019.8929371
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
User Authentication is a difficult problem yet to be addressed accurately. Little or no work is reported in literature dealing with clustering-based anomaly detection techniques for user authentication for keystroke data. Therefore, in this paper, Modified Differential Evolution (MDE) based subspace anomaly detection technique is proposed for user authentication in the context of behavioral biometrics using keystroke dynamics features. Thus, user authentication is posed as an anomaly detection problem. Anomalies in CMU's keystroke dynamics dataset are identified using subspace-based and distance-based techniques. It is observed that, among the proposed techniques, MDE based subspace anomaly detection technique yielded the highest Area Under ROC Curve (AUC) for user authentication problem. We also performed a Wilcoxon Signed Rank statistical test to corroborate our results statistically.
引用
收藏
页码:739 / 744
页数:6
相关论文
共 19 条
[11]   Comparing Anomaly-Detection Algorithms for Keystroke Dynamics [J].
Killourhy, Kevin S. ;
Maxion, Roy A. .
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009), 2009, :125-134
[12]   Key generation for plain text in stream cipher via bi-objective evolutionary computing [J].
Krishna, Gutha Jaya ;
Ravi, Vadlamani ;
Bhattu, S. Nagesh .
APPLIED SOFT COMPUTING, 2018, 70 :301-317
[13]   Evolutionary computing applied to customer relationship management: A survey [J].
Krishna, Gutha Jaya ;
Ravi, Vadlamani .
ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2016, 56 :30-59
[14]  
Maheshwary S., 2017, IWAISE 1 INT WORKSH, P59
[15]   Keystroke recognition for virtual keyboard [J].
Mäntyjärvi, J ;
Koivumäki, J ;
Vuori, P .
IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOL I AND II, PROCEEDINGS, 2002, :A429-A432
[16]   Keystroke dynamics verification using a spontaneously generated password [J].
Modi, Shimon ;
Elliott, Stephen J. .
2006: 40TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCES SECURITY TECHNOLOGY, PROCEEDINGS, 2006, :116-+
[17]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[18]   An Improved Micropropagation Protocol by Ex Vitro Rooting of Passiflora edulis Sims. f. flavicarpa Deg. through Nodal Segment Culture [J].
Shekhawat, Mahipal S. ;
Manokari, M. ;
Ravindran, C. P. .
SCIENTIFICA, 2015, 2015 :1-8
[19]  
Zhong Y., 2012, P IEEE COMP SOC C CO, P117, DOI [DOI 10.1109/CVPRW.2012.6239225, 10.1109/CVPRW.2012.6239225]