Comparing Anomaly-Detection Algorithms for Keystroke Dynamics

被引:312
作者
Killourhy, Kevin S. [1 ]
Maxion, Roy A. [1 ]
机构
[1] Carnegie Mellon Univ, Dept Comp Sci, Dependable Syst Lab, Pittsburgh, PA 15213 USA
来源
2009 IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS (DSN 2009) | 2009年
关键词
D O I
10.1109/DSN.2009.5270346
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Keystroke dynamics-the analysis of typing rhythms to discriminate among users-has been proposed for detecting impostors (Le., both insiders and external attackers). Since many anomaly-detection algorithms have been proposed for this task, it is natural to ask which are the top performers (e.g., to identify promising research directions). Unfortunately, we cannot conduct a sound comparison of detectors using the results in the literature because evaluation conditions are inconsistent across studies. Our objective is to collect a keystroke-dynamics data set, to develop a repeatable. evaluation procedure, and to measure the performance of a range of detectors so that the results can be compared soundly. We collected data from 51 subjects typing 400 passwords each, and we implemented and evaluated 14 detectors from the keystroke-dynamics and pattern-recognition literature. The three top performing detectors achieve equal-error rates between 9.6% and 10.2%. The results-along with the shared data and evaluation methodology-constitute a benchmark for comparing detectors and measuring progress.
引用
收藏
页码:125 / 134
页数:10
相关论文
共 22 条
[1]  
[Anonymous], 501331 CENELEC EN
[2]  
[Anonymous], 2001, Pattern Classification
[3]  
Araújo LCF, 2004, LECT NOTES COMPUT SC, V3072, P694
[4]   COMPUTER-ACCESS SECURITY SYSTEMS USING KEYSTROKE DYNAMICS [J].
BLEHA, S ;
SLIVINSKY, C ;
HUSSIEN, B .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1990, 12 (12) :1217-1222
[5]   Web-based keystroke dynamics identity verification using neural network [J].
Cho, S ;
Han, C ;
Han, DH ;
Kim, HI .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) :295-307
[6]  
Forsen G., 1977, RADCTR77333
[7]  
Gaines R., 1980, R2526NSF RAND CORP
[8]  
Haider S, 2000, IEEE SYS MAN CYBERN, P1336, DOI 10.1109/ICSMC.2000.886039
[9]  
HWANG B, 1999, P INT JOINT C NEUR N, V5, P3086, DOI DOI 10.1109/IJCNN.1999.836051
[10]   IDENTITY AUTHENTICATION BASED ON KEYSTROKE LATENCIES [J].
JOYCE, R ;
GUPTA, G .
COMMUNICATIONS OF THE ACM, 1990, 33 (02) :168-176