TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings

被引:0
|
作者
Lulu Yang
Chen Li
Ruibang You
Bibo Tu
Linghui Li
机构
[1] Institute of Information Engineering,
[2] Chinese Academy of Sciences,undefined
[3] School of Cyber Security,undefined
[4] University of Chinese Academy of Sciences,undefined
[5] Key Laboratory of Trustworthy Distributed Computing and Service,undefined
[6] Ministry of Education,undefined
[7] Beijing University of Posts and Telecommunications,undefined
来源
Cybersecurity | / 4卷
关键词
Keystroke dynamics; Continuous user authentication; Embedding; LSTM; Bi-LSTM;
D O I
暂无
中图分类号
学科分类号
摘要
Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some tasks. It remains a considerable challenge to authenticate users continuously and accurately with short keystroke inputs collected in uncontrolled settings. In this work, we propose a Timely Keystroke-based method for Continuous user Authentication, named TKCA. It integrates the key name and two kinds of timing features through an embedding mechanism. And it captures the relationship between context keystrokes by the Bidirectional Long Short-Term Memory (Bi-LSTM) network. We conduct a series of experiments to validate it on a public dataset - the Clarkson II dataset collected in a completely uncontrolled and natural setting. Experiment results show that the proposed TKCA achieves state-of-the-art performance with 8.28% of EER when using only 30 keystrokes and 2.78% of EER when using 190 keystrokes.
引用
收藏
相关论文
共 44 条
  • [1] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    CYBERSECURITY, 2021, 4 (01)
  • [2] Introducing touchstroke: keystroke-based authentication system for smartphones
    Kambourakis, Georgios
    Damopoulos, Dimitrios
    Papamartzivanos, Dimitrios
    Pavlidakis, Emmanouil
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 542 - 554
  • [3] Combined Use of Pattern Recognition Algorithms for Keystroke-based Continuous Authentication System
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Arseni, Stefan C.
    Fratu, Octavian
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [4] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239
  • [5] MLP Neural Network for Keystroke-based User Identification System
    Popovici, Eduard C.
    Guta, Ovidiu G.
    Stancu, Liviu A.
    Arseni, Stefan C.
    Fratu, Octavian
    2013 11TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS IN MODERN SATELLITE, CABLE AND BROADCASTING SERVICES (TELSIKS), VOLS 1 AND 2, 2013, : 155 - 158
  • [6] Securing an Alerting Subsystem for a Keystroke-based User Identification System
    Arseni, Stefan C.
    Popovici, Eduard C.
    Stancu, Liviu A.
    Guta, Ovidiu G.
    Halunga, Simona V.
    2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
  • [7] Sequence Alignment of Dynamic Intervals for Keystroke Dynamics based User Authentication
    Ho, Jiacang
    Kang, Dae-Ki
    2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, : 1433 - 1438
  • [8] Keystroke-Based Authentication by Key Press Intervals as a Complementary Behavioral Biometric
    Giroux, Shallen
    Wachowiak-Smolikova, Renata
    Wachowiak, Mark P.
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 80 - 85
  • [9] Utilizing overt and latent linguistic structure to improve keystroke-based authentication
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    IMAGE AND VISION COMPUTING, 2017, 58 : 230 - 238
  • [10] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,