User Authentication Based on Keystroke Dynamics

被引:12
作者
Das, Rajat Kumar [1 ]
Mukhopadhyay, Sudipta [1 ]
Bhattacharya, Puranjoy [2 ]
机构
[1] IIT Kharagpur, Dept E & ECE Engn, Kharagpur, W Bengal, India
[2] Intel Technol India Ltd, Bangalore, Karnataka, India
关键词
Behavioural biometric; Continuous authentication; Free text; Gaussian mixture model (GMM); Hold time; Latency time; Keystroke dynamics; Neural network (NN); IDENTITY; IDENTIFICATION;
D O I
10.1080/03772063.2014.914686
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a technique to verify user identity using keystroke dynamics from short text, namely the computer login string. The keystroke behavioural pattern is obtained when a person types with a QWERTY keyboard. Two features hold time of an individual key and the latency of the consecutive keystrokes is used for authentication. Using a small training sample, accuracies of 90% and 99% are achieved for the data-set of 220 login strings per user (40 strings from legal user +180 strings from nine intruders) using Gaussian mixture model and two-layer feed-forward neural network, respectively, as classifier. The paper then proceeds to a comprehensive study to explain how the accuracy varies with the length of the input string and with negative data in the training set.
引用
收藏
页码:229 / 239
页数:11
相关论文
共 21 条
[1]  
[Anonymous], 1998, IEEE T PATTERN ANAL
[2]  
[Anonymous], INT CONF ACOUST SPEE
[3]  
[Anonymous], 2007, Pattern Classification
[4]  
[Anonymous], P 5 MEX INT C COMP S
[5]  
[Anonymous], 2006, Pattern recognition and machine learning
[6]  
[Anonymous], R2560NSF RAND CORP
[7]  
[Anonymous], 1997, MACHINE LEARNING, MCGRAW-HILL SCIENCE/ENGINEERING/MATH
[8]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[9]   Applying hidden Markov models to keystroke pattern analysis for password verification [J].
Chen, W ;
Chang, WD .
PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, :467-474
[10]   Advanced user authentication for mobile devices [J].
Clarke, N. L. ;
Furnell, S. M. .
COMPUTERS & SECURITY, 2007, 26 (02) :109-119