Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms

被引:5
作者
Salem, Asma [1 ]
Sharieh, Ahmad [1 ]
Sleit, Azzam [1 ]
Jabri, Riad [1 ]
机构
[1] Univ Jordan, KASIT, Comp Sci Dept, Amman, Jordan
关键词
Security; biometric authentication; keystroke dynamics; behavioral authentication; VERIFICATION;
D O I
10.3837/tiis.2019.08.014
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, most users access internet through mobile applications. The common way to authenticate users through websites forms is using passwords; while they are efficient procedures, they are subject to guessed or forgotten and many other problems. Additional multi modal authentication procedures are needed to improve the security. Behavioral authentication is a way to authenticate people based on their typing behavior. It is used as a second factor authentication technique beside the passwords that will strength the authentication effectively. Keystroke dynamic rhythm is one of these behavioral authentication methods. Keystroke dynamics relies on a combination of features that are extracted and processed from typing behavior of users on the touched screen and smart mobile users. This Research presents a novel analysis in the keystroke dynamic authentication field using two features categories: timing and no timing combined features. The proposed model achieved lower error rate of false acceptance rate with 0.1%, false rejection rate with 0.8%, and equal error rate with 0.45%. A comparison in the performance measures is also given for multiple datasets collected in purpose to this research.
引用
收藏
页码:4076 / 4092
页数:17
相关论文
共 35 条
[1]  
Al-Obaidi NM, 2016, 2016 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS (ICDIPC), P186, DOI 10.1109/ICDIPC.2016.7470816
[2]   Dynamic User Verification Using Touch Keystroke Based on Medians Vector Proximity [J].
Alghamdi, Shatha J. ;
Elrefaei, Lamiaa A. .
PROCEEDINGS 7TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS CICSYN 2015, 2015, :121-126
[3]   Keystroke Biometric Systems for User Authentication [J].
Ali, Md Liakat ;
Monaco, John V. ;
Tappert, Charles C. ;
Qiu, Meikang .
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (2-3) :175-190
[4]   Authentication and Identification Methods Used in Keystroke Biometric Systems [J].
Ali, Md Liakat ;
Tappert, Charles C. ;
Qiu, Meikang ;
Monaco, John V. .
2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, :1424-1429
[5]   Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication [J].
Alshanketi, Faisal ;
Traore, Issa ;
Awad, Ahmed E. A. .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, :66-73
[6]  
[Anonymous], RANDOM FOREST SUPERV
[7]  
[Anonymous], DECISION TREE LEARNI
[8]  
[Anonymous], P 19 MIDW ART INT CO
[9]  
[Anonymous], 2016, Journal of Social Sciences (COESe4RJ-JSS)
[10]  
[Anonymous], IMPLEMENTING NEURAL