On Neural Networks for Biometric Authentication Based on Keystroke Dynamics

被引:13
作者
Lin, Chu-Hsing [1 ]
Liu, Jung-Chun [1 ]
Lee, Ken-Yu [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci, 1727,Sec 4,Taiwan Blvd, Taichung 40704, Taiwan
关键词
biometric authentication; keystroke dynamics; machine learning; convolutional neural network; GPU parallel computing;
D O I
10.18494/SAM.2018.1757
中图分类号
TH7 [仪器、仪表];
学科分类号
0804 ; 080401 ; 081102 ;
摘要
Nowadays, passwords have become closely associated with our daily activities. However, the development of technology also increases the risk of password leak. For example, the graphics processing unit (GPU)-parallel-computing-based brute force attack and birthday attack algorithms have greatly reduced password security; in addition, passwords are usually transmitted through wired or wireless communication media and thus are vulnerable to attack and easily exposed to illegal users. In this study, we propose a biometric authentication method to identify and block illegal users, even if the entire password is exposed. Our method simultaneously records scan codes and the keystroke sequence of passwords; furthermore, by deep learning of convolutional neural networks (CNNs), it can effectively distinguish legal users from illegal users. We first compare recognition rates between the CNN and the neural network (NN) and prove that the CNN is the better choice. The experimental results show that the proposed CNN model can block all illegal users even if the password is known by them. By using equal amounts of password data from legal and illegal users, the average login failure rate of legal users is 6%, and they can always enter passwords again to be admitted. Finally, by GPU parallel computing, we further accelerate the system performance by 4.45 times.
引用
收藏
页码:385 / 396
页数:12
相关论文
共 17 条
  • [1] [Anonymous], P 2016 IEEE 17 INT S
  • [2] [Anonymous], 2010 4 INT C GEN EV
  • [3] [Anonymous], 2015, ARXIV PREPRINT ARXIV
  • [4] [Anonymous], CONV NEUR NETW LENET
  • [5] [Anonymous], 2010, Introduction to Machine Learning
  • [6] [Anonymous], 2011 IEEE 3 INT C PR
  • [7] Buza K, 2016, 2016 IEEE 11TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), P453, DOI 10.1109/SACI.2016.7507419
  • [8] Hagan M.T., 1996, Neural Network Design
  • [9] A Study on Immersion of Hand Interaction for Mobile Platform Virtual Reality Contents
    Han, Seunghun
    Kim, Jinmo
    [J]. SYMMETRY-BASEL, 2017, 9 (02):
  • [10] Keystroke dynamics-based user authentication using long and free text strings from various input devices
    Kang, Pilsung
    Cho, Sungzoon
    [J]. INFORMATION SCIENCES, 2015, 308 : 72 - 93