User Authentication Based on Keystroke Dynamics

被引:12
作者
Das, Rajat Kumar [1 ]
Mukhopadhyay, Sudipta [1 ]
Bhattacharya, Puranjoy [2 ]
机构
[1] IIT Kharagpur, Dept E & ECE Engn, Kharagpur, W Bengal, India
[2] Intel Technol India Ltd, Bangalore, Karnataka, India
关键词
Behavioural biometric; Continuous authentication; Free text; Gaussian mixture model (GMM); Hold time; Latency time; Keystroke dynamics; Neural network (NN); IDENTITY; IDENTIFICATION;
D O I
10.1080/03772063.2014.914686
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a technique to verify user identity using keystroke dynamics from short text, namely the computer login string. The keystroke behavioural pattern is obtained when a person types with a QWERTY keyboard. Two features hold time of an individual key and the latency of the consecutive keystrokes is used for authentication. Using a small training sample, accuracies of 90% and 99% are achieved for the data-set of 220 login strings per user (40 strings from legal user +180 strings from nine intruders) using Gaussian mixture model and two-layer feed-forward neural network, respectively, as classifier. The paper then proceeds to a comprehensive study to explain how the accuracy varies with the length of the input string and with negative data in the training set.
引用
收藏
页码:229 / 239
页数:11
相关论文
共 21 条
  • [1] [Anonymous], 1998, IEEE T PATTERN ANAL
  • [2] [Anonymous], INT CONF ACOUST SPEE
  • [3] [Anonymous], 2007, Pattern Classification
  • [4] [Anonymous], P 5 MEX INT C COMP S
  • [5] [Anonymous], 2006, Pattern recognition and machine learning
  • [6] [Anonymous], R2560NSF RAND CORP
  • [7] [Anonymous], 1997, MACHINE LEARNING, MCGRAW-HILL SCIENCE/ENGINEERING/MATH
  • [8] USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS
    BROWN, M
    ROGERS, SJ
    [J]. INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06): : 999 - 1014
  • [9] Applying hidden Markov models to keystroke pattern analysis for password verification
    Chen, W
    Chang, WD
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 467 - 474
  • [10] Advanced user authentication for mobile devices
    Clarke, N. L.
    Furnell, S. M.
    [J]. COMPUTERS & SECURITY, 2007, 26 (02) : 109 - 119