Meta-Heuristic Optimization and Keystroke Dynamics for Authentication of Smartphone Users

被引:40
|
作者
El-Kenawy, El-Sayed M. [1 ]
Mirjalili, Seyedali [2 ,3 ]
Abdelhamid, Abdelaziz A. [4 ]
Ibrahim, Abdelhameed [5 ]
Khodadadi, Nima [6 ]
Eid, Marwa M. [7 ]
机构
[1] Delta Higher Inst Engn & Technol, Dept Commun & Elect, Mansoura 35111, Egypt
[2] Torrens Univ Australia, Ctr Artificial Intelligence Res & Optimizat, Fortitude Valley, Qld 4006, Australia
[3] Yonsei Univ, Yonsei Frontier Lab, Seoul 03722, South Korea
[4] Ain Shams Univ, Fac Comp & Informat Sci, Dept Comp Sci, Cairo 11566, Egypt
[5] Mansoura Univ, Fac Engn, Comp Engn & Control Syst Dept, Mansoura 35516, Egypt
[6] Florida Int Univ, Dept Civil & Environm Engn, Miami, FL 33199 USA
[7] Delta Univ Sci & Technol, Fac Artificial Intelligence, Mansoura 11152, Egypt
关键词
meta-heuristic optimization; feature selection; keystroke dynamics; smartphone; authentication; Dipper Throated Optimization; Bidirectional Recurrent Neural Network; BIOMETRIC AUTHENTICATION; SELECTION;
D O I
10.3390/math10162912
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Personal Identification Numbers (PIN) and unlock patterns are two of the most often used smartphone authentication mechanisms. Because PINs have just four or six characters, they are subject to shoulder-surfing attacks and are not as secure as other authentication techniques. Biometric authentication methods, such as fingerprint, face, or iris, are now being studied in a variety of ways. The security of such biometric authentication is based on PIN-based authentication as a backup when the maximum defined number of authentication failures is surpassed during the authentication process. Keystroke-dynamics-based authentication has been studied to circumvent this limitation, in which users were categorized by evaluating their typing patterns as they input their PIN. A broad variety of approaches have been proposed to improve the capacity of PIN entry systems to discriminate between normal and abnormal users based on a user's typing pattern. To improve the accuracy of user discrimination using keystroke dynamics, we propose a novel approach for improving the parameters of a Bidirectional Recurrent Neural Network (BRNN) used in classifying users' keystrokes. The proposed approach is based on a significant modification to the Dipper Throated Optimization (DTO) algorithm by employing three search leaders to improve the exploration process of the optimization algorithm. To assess the effectiveness of the proposed approach, two datasets containing keystroke dynamics were included in the conducted experiments. In addition, we propose a feature selection algorithm for selecting the proper features that enable better user classification. The proposed algorithms are compared to other optimization methods in the literature, and the results showed the superiority of the proposed algorithms. Moreover, a statistical analysis is performed to measure the stability and significance of the proposed methods, and the results confirmed the expected findings. The best classification accuracy achieved by the proposed optimized BRNN is 99.02% and 99.32% for the two datasets.
引用
收藏
页数:26
相关论文
共 50 条
  • [1] Keystroke dynamics for authentication in smartphone
    Roh, Jong-hyuk
    Lee, Sung-Hun
    Kim, Soohyung
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 1155 - 1159
  • [2] Strengthening Password Authentication using Keystroke Dynamics and Smartphone Sensors
    Anusas-amornkul, Tanapat
    PROCEEDINGS OF 9TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND MANAGEMENT (ICICM 2019), 2019, : 70 - 74
  • [3] Keystroke Dynamics Support for Authentication
    Patel, Mayank Sachan Sardar
    Joshi, Padmaja
    Patel, Nataasha Raul Sardar
    2017 INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN COMPUTER, ELECTRICAL, ELECTRONICS AND COMMUNICATION (CTCEEC), 2017, : 186 - 191
  • [4] Identity authentication based on keystroke dynamics for mobile device users
    Gao, Zhigang
    Diao, Wenjie
    Huang, Yucai
    Xu, Ruichao
    Lu, Huijuan
    Zhang, Jianhui
    PATTERN RECOGNITION LETTERS, 2021, 148 : 61 - 67
  • [5] Mimicry Attacks on Smartphone Keystroke Authentication
    Khan, Hassan
    Hengartner, Urs
    Vogel, Daniel
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2020, 23 (01)
  • [6] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Imane Lamiche
    Guo Bin
    Yao Jing
    Zhiwen Yu
    Abdenour Hadid
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 4417 - 4430
  • [7] A continuous smartphone authentication method based on gait patterns and keystroke dynamics
    Lamiche, Imane
    Bin, Guo
    Jing, Yao
    Yu, Zhiwen
    Hadid, Abdenour
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (11) : 4417 - 4430
  • [8] Atomic Energy Optimization: A Novel Meta-Heuristic Inspired by Energy Dynamics and Dissipation
    Omari, Mohammed
    Kaddi, Mohammed
    Salameh, Khouloud
    Alnoman, Ali
    Benhadji, Mohammed
    IEEE ACCESS, 2025, 13 : 2801 - 2828
  • [9] Keystroke Dynamics for Biometric Authentication - A Survey
    Bhatt, Shanthi
    Santhanam, T.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [10] Online User Authentication System Using Keystroke Dynamics
    Salem, Asma
    Jabri, Ahmad Sharieh Riad
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (03) : 185 - 215