An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics

被引:0
作者
Shanmugapriya, D. [1 ]
Padmavathi, G. [2 ]
机构
[1] Avinashilingam Inst Home Sci & Higher Educ women, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Avinashilingam Inst Home Sci & Higher Educ women, Dept Comp Sci, Coimbatore, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 10期
关键词
Keystroke Dynamics; Z-Score; Feature Selection; Ant colony Optimization (ACO); Particle Swarm Optimization (PSO); Genetic Algorithm (GA); Extreme Learning Machine (ELM).Virtual Key Force;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing the sensitive data and computer systems by allowing ease access to authenticated users an d withstanding the attacks of imposters is one of the major challenges in the field of computer security. ID and password are the most widely used method for authenticating the computer systems. But, this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary dttack, guessing, phishing and many more. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. Keystroke features like dwell time, flight time, di-graph, tri-graph and virtual key force of every user are used in this paper. For the purpose of preprocessing Z-Score method is used. Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) algorithm is used with Extreme Learning Machine (ELM) for feature subset selection. In order to classify the obtained results ELM algorithm is used. Comparison of ACO, PSO and GA with ELM respectively is done to find the best method for feature subset selection. From the results, it is revealed that ACO with ELM is best for feature subset selection.
引用
收藏
页码:191 / 195
页数:5
相关论文
共 50 条
[21]   Effective User Authentications Using Keystroke Dynamics Based on Feature Selections [J].
Darabseh, Alaa ;
Namin, Akbar Siami .
2015 IEEE 14TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA), 2015, :307-312
[22]   User authentication by information source using fuzzy approach in biometric keystroke dynamics [J].
Hub, Miloslav .
PROCEEDINGS OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEMS, VOL 2: SYSTEMS THEORY AND APPLICATIONS, 2007, :270-+
[23]   Mobile User Identification through Authentication using Keystroke Dynamics and Accelerometer Biometrics [J].
Corpus, Kyle R. ;
Gonzales, Ralph Joseph D. L. ;
Morada, Alvin Scott ;
Vea, Larry A. .
2016 IEEE/ACM INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS (MOBILESOFT 2016), 2016, :11-12
[24]   One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics [J].
Jiacang Ho ;
Dae-Ki Kang .
Applied Intelligence, 2018, 48 :1547-1564
[25]   An authentication system using keystroke dynamics [J].
Zareen, Farhana Javed ;
Matta, Chirag ;
Arora, Akshay ;
Singh, Sarmod ;
Jabin, Suraiya .
INTERNATIONAL JOURNAL OF BIOMETRICS, 2018, 10 (01) :65-76
[26]   Biometric Authentication Using Keystroke Dynamics [J].
Jadhav, Chandralekha ;
Kulkarni, Siddhi ;
Shelar, Sagar ;
Shinde, Kaustubh ;
Dharwadkar, Nagaraj V. .
2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, :870-875
[27]   A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics [J].
Revett, Kenneth .
INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2009, 7 (01) :7-15
[28]   Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection [J].
Kim, Junhong ;
Kim, Haedong ;
Kang, Pilsung .
APPLIED SOFT COMPUTING, 2018, 62 :1077-1087
[29]   On the use of rough sets for user authentication via keystroke dynamics [J].
Revett, Kenneth ;
de Magalhaes, Sergio Tenreiro ;
Santos, Henrique M. D. .
PROGRESS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4874 :145-+
[30]   A machine learning approach to keystroke dynamics based user authentication [J].
Revett, Kenneth ;
Gorunescu, Florin ;
Gorunescu, Marina ;
Ene, Marius ;
de Magalhaes, Sergio Tenreiro ;
Dinis Santos, Henrique M. .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) :55-70