Trajectory Mining for Keystroke Dynamics Authentication

被引:5
作者
Wangsuk, Kasem [1 ]
Anusas-amornkul, Tanapat [1 ]
机构
[1] King Mongkuts Univ Technol North Bangkok, Bangkok 10800, Thailand
来源
17TH ASIA PACIFIC SYMPOSIUM ON INTELLIGENT AND EVOLUTIONARY SYSTEMS, IES2013 | 2013年 / 24卷
关键词
Authentication; Keystroke Dynamics; Trajectory Dissimilarity; Feature Selections;
D O I
10.1016/j.procs.2013.10.041
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper focuses on enhancing a username and password authentication scheme, which has some weaknesses because a username is publicly known and a password can be guessed. When an attacker knows or guesses a password correctly, the system is compromised. Therefore, this research focuses on this weakness and proposes an additional security token to this scheme by combining keystroke dynamics into the system. A username is typically not changed but a password is required to change frequently for a better security level. A username is typed frequently such that the familiar typing can be used as a behavioral biometrics of a user. Therefore, a keystroke dynamics profile is proposed using a trajectory dissimilarity technique to verify user's typing behavior on a username as an additional authentication token. Several features are mined for keystroke dynamics to create a trajectory profile, which gives the best results of 4% equal error rate (EER) or 96% authentication accuracy. (C) 2013 The Authors. Published by Elsevier B.V.
引用
收藏
页码:175 / 183
页数:9
相关论文
共 18 条
[1]  
[Anonymous], EUROPEAN J SCI RES
[2]  
[Anonymous], 2007, P 2 ACM S INFORM COM
[3]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[4]  
Giot R., 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), P11, DOI 10.1109/IIH-MSP.2012.10
[5]  
Giot R, 2009, 2009 IEEE 3RD INTERNATIONAL CONFERENCE ON BIOMETRICS: THEORY, APPLICATIONS AND SYSTEMS, P425
[6]  
Haider S., 2000, C SYST MAN CYB, P1336
[7]  
Kaneko Y., 2011, 9 ANN INT C PRIV SEC
[8]  
KANG P, 2007, CONTINUAL RETRAIN KE, V4642, P1203
[9]  
Laurinen P, 2006, PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND APPLICATIONS, P392
[10]  
Limpanuparb T., 2004, NECTEC TECH J, V4, P531