TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings

被引:4
|
作者
Yang, Lulu [1 ,2 ]
Li, Chen [1 ,2 ]
You, Ruibang [1 ,2 ]
Tu, Bibo [1 ,2 ]
Li, Linghui [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100049, Peoples R China
[3] Beijing Univ Posts & Telecommun, Key Lab Trustworthy Distributed Comp & Serv, Minist Educ, Beijing 100876, Peoples R China
基金
国家重点研发计划;
关键词
Keystroke dynamics; Continuous user authentication; Embedding; LSTM; Bi-LSTM; DYNAMICS;
D O I
10.1186/s42400-021-00075-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some tasks. It remains a considerable challenge to authenticate users continuously and accurately with short keystroke inputs collected in uncontrolled settings. In this work, we propose a Timely Keystroke-based method for Continuous user Authentication, named TKCA. It integrates the key name and two kinds of timing features through an embedding mechanism. And it captures the relationship between context keystrokes by the Bidirectional Long Short-Term Memory (Bi-LSTM) network. We conduct a series of experiments to validate it on a public dataset - the Clarkson II dataset collected in a completely uncontrolled and natural setting. Experiment results show that the proposed TKCA achieves state-of-the-art performance with 8.28% of EER when using only 30 keystrokes and 2.78% of EER when using 190 keystrokes.
引用
收藏
页数:16
相关论文
共 48 条
  • [1] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    Cybersecurity, 4
  • [2] Introducing touchstroke: keystroke-based authentication system for smartphones
    Kambourakis, Georgios
    Damopoulos, Dimitrios
    Papamartzivanos, Dimitrios
    Pavlidakis, Emmanouil
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 542 - 554
  • [3] Combined Use of Pattern Recognition Algorithms for Keystroke-based Continuous Authentication System
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Arseni, Stefan C.
    Fratu, Octavian
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [4] Keystroke-Based Authentication by Key Press Intervals as a Complementary Behavioral Biometric
    Giroux, Shallen
    Wachowiak-Smolikova, Renata
    Wachowiak, Mark P.
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 80 - 85
  • [5] Utilizing overt and latent linguistic structure to improve keystroke-based authentication
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    IMAGE AND VISION COMPUTING, 2017, 58 : 230 - 238
  • [6] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239
  • [7] Keystroke-based Continuous Authentication while Listening to Music on Your Smart-phone
    Primo, Abena
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 217 - 225
  • [8] MLP Neural Network for Keystroke-based User Identification System
    Popovici, Eduard C.
    Guta, Ovidiu G.
    Stancu, Liviu A.
    Arseni, Stefan C.
    Fratu, Octavian
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 155 - 158
  • [9] Securing an Alerting Subsystem for a Keystroke-based User Identification System
    Arseni, Stefan C.
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Halunga, Simona V.
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [10] Sequence Alignment of Dynamic Intervals for Keystroke Dynamics based User Authentication
    Ho, Jiacang
    Kang, Dae-Ki
    2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, : 1433 - 1438