An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics

被引:0
|
作者
Shanmugapriya, D. [1 ]
Padmavathi, G. [2 ]
机构
[1] Avinashilingam Inst Home Sci & Higher Educ women, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Avinashilingam Inst Home Sci & Higher Educ women, Dept Comp Sci, Coimbatore, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 10期
关键词
Keystroke Dynamics; Z-Score; Feature Selection; Ant colony Optimization (ACO); Particle Swarm Optimization (PSO); Genetic Algorithm (GA); Extreme Learning Machine (ELM).Virtual Key Force;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing the sensitive data and computer systems by allowing ease access to authenticated users an d withstanding the attacks of imposters is one of the major challenges in the field of computer security. ID and password are the most widely used method for authenticating the computer systems. But, this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary dttack, guessing, phishing and many more. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. Keystroke features like dwell time, flight time, di-graph, tri-graph and virtual key force of every user are used in this paper. For the purpose of preprocessing Z-Score method is used. Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) algorithm is used with Extreme Learning Machine (ELM) for feature subset selection. In order to classify the obtained results ELM algorithm is used. Comparison of ACO, PSO and GA with ELM respectively is done to find the best method for feature subset selection. From the results, it is revealed that ACO with ELM is best for feature subset selection.
引用
收藏
页码:191 / 195
页数:5
相关论文
共 50 条
  • [1] User tuned feature selection in keystroke dynamics
    Amarnadh, Jyothi Bhaskarr
    Gamboa, Hugo
    Fred, Ana
    BIOSIGNALS 2008: PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON BIO-INSPIRED SYSTEMS AND SIGNAL PROCESSING, VOL II, 2008, : 546 - 550
  • [2] Free-text User Authentication Technique through Keystroke Dynamics
    Roy, Soumen
    Roy, Utpal
    Sinha, D. D.
    2014 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND APPLICATIONS (ICHPCA), 2014,
  • [3] A novel approach for user authentication using keystroke dynamics
    Shekhawat, Kirty
    Bhatt, Devershi Pallavi
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (07) : 2015 - 2027
  • [4] Online User Authentication System Using Keystroke Dynamics
    Salem, Asma
    Jabri, Ahmad Sharieh Riad
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (03) : 185 - 215
  • [5] User Authentication with Keystroke Dynamics using Fixed Text
    Rybnik, Mariusz
    Panasiuk, Piotr
    Saeed, Khalid
    ICBAKE: 2009 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING, 2009, : 70 - +
  • [6] User Authentication Using Keystroke Dynamics via Crowdsourcing
    Foresi, Andrew
    Samavi, Reza
    2019 17TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2019, : 336 - 338
  • [7] User classiflcation for keystroke dynamics authentication
    Hocquet, Sylvain
    Ramel, Jean-Yves
    Cardot, Hubert
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 531 - +
  • [8] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239
  • [9] Feature Selection for Android Keystroke Dynamics
    El Zein, Dima
    Kalakech, Ali
    2018 19TH INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2018, : 246 - 251
  • [10] Continuous User Authentication using Keystroke Dynamics for Touch Devices
    Herath, H. M. C. K. B.
    Dulanga, K. G. C.
    Tharindu, N. V. D.
    Ganegoda, G. U.
    2022 2ND INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND ROBOTICS (ICIPROB), 2022,