An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics

被引:0
作者
Shanmugapriya, D. [1 ]
Padmavathi, G. [2 ]
机构
[1] Avinashilingam Inst Home Sci & Higher Educ women, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Avinashilingam Inst Home Sci & Higher Educ women, Dept Comp Sci, Coimbatore, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 10期
关键词
Keystroke Dynamics; Z-Score; Feature Selection; Ant colony Optimization (ACO); Particle Swarm Optimization (PSO); Genetic Algorithm (GA); Extreme Learning Machine (ELM).Virtual Key Force;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing the sensitive data and computer systems by allowing ease access to authenticated users an d withstanding the attacks of imposters is one of the major challenges in the field of computer security. ID and password are the most widely used method for authenticating the computer systems. But, this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary dttack, guessing, phishing and many more. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. Keystroke features like dwell time, flight time, di-graph, tri-graph and virtual key force of every user are used in this paper. For the purpose of preprocessing Z-Score method is used. Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) algorithm is used with Extreme Learning Machine (ELM) for feature subset selection. In order to classify the obtained results ELM algorithm is used. Comparison of ACO, PSO and GA with ELM respectively is done to find the best method for feature subset selection. From the results, it is revealed that ACO with ELM is best for feature subset selection.
引用
收藏
页码:191 / 195
页数:5
相关论文
共 50 条
  • [21] One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics
    Jiacang Ho
    Dae-Ki Kang
    Applied Intelligence, 2018, 48 : 1547 - 1564
  • [22] An authentication system using keystroke dynamics
    Zareen, Farhana Javed
    Matta, Chirag
    Arora, Akshay
    Singh, Sarmod
    Jabin, Suraiya
    INTERNATIONAL JOURNAL OF BIOMETRICS, 2018, 10 (01) : 65 - 76
  • [23] Biometric Authentication Using Keystroke Dynamics
    Jadhav, Chandralekha
    Kulkarni, Siddhi
    Shelar, Sagar
    Shinde, Kaustubh
    Dharwadkar, Nagaraj V.
    2017 INTERNATIONAL CONFERENCE ON I-SMAC (IOT IN SOCIAL, MOBILE, ANALYTICS AND CLOUD) (I-SMAC), 2017, : 870 - 875
  • [24] Mobile Authentication using Keystroke Dynamics
    Dhage, Sudhir
    Kundra, Pranav
    Kanchan, Anish
    Kap, Pratiksha
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATION, INFORMATION & COMPUTING TECHNOLOGY (ICCICT), 2015,
  • [25] A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics
    Revett, Kenneth
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2009, 7 (01) : 7 - 15
  • [26] Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection
    Kim, Junhong
    Kim, Haedong
    Kang, Pilsung
    APPLIED SOFT COMPUTING, 2018, 62 : 1077 - 1087
  • [27] A bioinformatics based approach to user authentication via keystroke dynamics
    Kenneth Revett
    International Journal of Control, Automation and Systems, 2009, 7 : 7 - 15
  • [28] Fingerprint Based Authentication System with Keystroke Dynamics for Realistic User
    Kumar, G. Vinoth
    Prasanth, K.
    Raj, S. Govinth
    Sarathi, S.
    SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 206 - 209
  • [29] Keystroke Dynamics Biometrics, A tool for User Authentication-Review
    Quraishi, Suhail Javed
    Bedi, S. S.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, : 248 - 254
  • [30] Time-frequency analysis of keystroke dynamics for user authentication
    Toosi, Ramin
    Akhaee, Mohammad Ali
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 438 - 447