Applying hidden Markov models to keystroke pattern analysis for password verification

被引:18
作者
Chen, W
Chang, WD
机构
来源
PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004) | 2004年
关键词
D O I
10.1109/IRI.2004.1431505
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to increasing incidents of security breaches in the cyber space, a rigorous user authentication process has become crucial. A very feasible biometric approach to verify the authenticity of a user is to examine his/her typing patterns. There is a significant difference in the keystroke patterns exhibited from person to person, even when asked to type the same words. Typing patterns can be shown in the intervals between keys, holding time, overlap keys, etc. Individual's typing pattern develops naturally and uniquely just as each person writes differently. We propose an analytical process based on a hidden Markov model (HMM) to learn the special patterns from individuals, and then to identify them. During training, the timing information of each keystroke is recorded at its holding and releasing events, and the pattern is then extracted from the relationship of the events within a word. The experiment to be conducted is to authenticate users when entering words. The idea is to implement a process to examine the typing pattern as a user enters higher password, in order to augment the conventional password system. We find the discrete first-order HMM to be very suitable for our purpose. Due to the non-deterministic nature of the keystroke events, modeling with a stochastic process such as the HMM which has probabilistic state transitions can not only recognize the patterns in the keys already typed, but also predict the following sequence. The issue is similar to the recognition of hand-written characters or spoken words. The experimental results are nearly perfect among twenty test subjects all randomly chosen in a controlled environment of a standard computer laboratory.
引用
收藏
页码:467 / 474
页数:8
相关论文
共 18 条
[1]  
Brown M., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P108, DOI 10.1109/CSAC.1994.367316
[2]  
Duncan A., 1986, Quality control and industrial statistics, V5th
[3]   VITERBI ALGORITHM [J].
FORNEY, GD .
PROCEEDINGS OF THE IEEE, 1973, 61 (03) :268-278
[4]   IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES [J].
JOYCE, R ;
GUPTA, G .
COMMUNICATIONS OF THE ACM, 1990, 33 (02) :168-176
[5]  
LEE KF, 1988, P IEEE INT C AC SPEE, P123
[6]   CONTINUOUSLY VARIABLE DURATION HIDDEN MARKOV MODELS FOR AUTOMATIC SPEECH RECOGNITION. [J].
Levinson, S.E. .
Computer Speech and Language, 1986, 1 (01) :29-45
[7]   AN INTRODUCTION TO THE APPLICATION OF THE THEORY OF PROBABILISTIC FUNCTIONS OF A MARKOV PROCESS TO AUTOMATIC SPEECH RECOGNITION [J].
LEVINSON, SE ;
RABINER, LR ;
SONDHI, MM .
BELL SYSTEM TECHNICAL JOURNAL, 1983, 62 (04) :1035-1074
[8]  
Lin DT, 1997, 1997 IEEE INTERNATIONAL CONFERENCE ON NEURAL NETWORKS, VOLS 1-4, P174, DOI 10.1109/ICNN.1997.611659
[9]  
Maisuria L. K., 1999, P IEEE INT JOINT C N, V5, P3295
[10]   VITAL SIGNS OF IDENTITY [J].
MILLER, B .
IEEE SPECTRUM, 1994, 31 (02) :22-30