A machine learning approach to keystroke dynamics based user authentication

被引:30
作者
Revett, Kenneth [1 ]
Gorunescu, Florin [2 ]
Gorunescu, Marina [2 ]
Ene, Marius [2 ]
de Magalhaes, Sergio Tenreiro [3 ]
Dinis Santos, Henrique M. [3 ]
机构
[1] Univ Westminster, Harrow Sch Comp Sci, London, England
[2] Univ Med & Pharm Craiova, Dept Math, Biostatist & Comp Sci, Craiova, Romania
[3] Univ Minho, Dept Informat Syst, Guimaraes, Campus Azurem, P-4800058 Guimaraes, Portugal
关键词
biometrics; equal error rate; EER; keystroke dynamics; probabilistic neural networks; PNNs;
D O I
10.1504/IJESDF.2007.013592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the use of a behavioural biometric based on keystroke dynamics. Although there are several implementations of keystroke dynamics available - their effectiveness is variable and dependent on the data sample and its acquisition methodology. The results from this study indicate that the Equal Error Rate (EER) is significantly influenced by the attribute selection process and to a lesser extent on the authentication algorithm employed. Our results also provide evidence that a Probabilistic Neural Network (PNN) can be superior in terms of reduced training time and classification accuracy when compared with a typical MLFN back- propagation trained neural network.
引用
收藏
页码:55 / 70
页数:16
相关论文
共 31 条
[1]  
Bergadano F., 2002, ACM Transactions on Information and Systems Security, V5, P367, DOI 10.1145/581271.581272
[2]  
Bleha S.A., 2002, P ACM SIGAPP S APPL
[3]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[4]   THE KEYSTROKE-LEVEL MODEL FOR USER PERFORMANCE TIME WITH INTERACTIVE SYSTEMS [J].
CARD, SK ;
MORAN, TP ;
NEWELL, A .
COMMUNICATIONS OF THE ACM, 1980, 23 (07) :396-410
[5]  
Davis Darren, 2004, 13 USENIX SEC S
[6]  
de Oliveira M., 2005, USER AUTHENTICATION
[7]   Enhanced password authentication through fuzzy logic [J].
deRu, WG ;
Eloff, JHP .
IEEE EXPERT-INTELLIGENT SYSTEMS & THEIR APPLICATIONS, 1997, 12 (06) :38-45
[8]  
GAINES R, 1980, R256NSF RAND CORP
[9]   An evolutionary computational approach to probabilistic neural network with application to hepatic cancer diagnosis [J].
Gorunescu, F ;
Gorunescu, M ;
El-Darzi, E ;
Gorunescu, S .
18TH IEEE SYMPOSIUM ON COMPUTER-BASED MEDICAL SYSTEMS, PROCEEDINGS, 2005, :461-466
[10]  
GORUNESCU F, 2005, P 1 EUR C HLTH CAR M, P149