An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics

被引:0
作者
Shanmugapriya, D. [1 ]
Padmavathi, G. [2 ]
机构
[1] Avinashilingam Inst Home Sci & Higher Educ women, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Avinashilingam Inst Home Sci & Higher Educ women, Dept Comp Sci, Coimbatore, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 10期
关键词
Keystroke Dynamics; Z-Score; Feature Selection; Ant colony Optimization (ACO); Particle Swarm Optimization (PSO); Genetic Algorithm (GA); Extreme Learning Machine (ELM).Virtual Key Force;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing the sensitive data and computer systems by allowing ease access to authenticated users an d withstanding the attacks of imposters is one of the major challenges in the field of computer security. ID and password are the most widely used method for authenticating the computer systems. But, this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary dttack, guessing, phishing and many more. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. Keystroke features like dwell time, flight time, di-graph, tri-graph and virtual key force of every user are used in this paper. For the purpose of preprocessing Z-Score method is used. Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) algorithm is used with Extreme Learning Machine (ELM) for feature subset selection. In order to classify the obtained results ELM algorithm is used. Comparison of ACO, PSO and GA with ELM respectively is done to find the best method for feature subset selection. From the results, it is revealed that ACO with ELM is best for feature subset selection.
引用
收藏
页码:191 / 195
页数:5
相关论文
共 50 条
[31]   Time-frequency analysis of keystroke dynamics for user authentication [J].
Toosi, Ramin ;
Akhaee, Mohammad Ali .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 :438-447
[32]   Keystroke Dynamics Biometrics, A tool for User Authentication-Review [J].
Quraishi, Suhail Javed ;
Bedi, S. S. .
PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART), 2018, :248-254
[33]   A Three-Step Authentication Model for Mobile Phone User Using Keystroke Dynamics [J].
Saini, Baljit Singh ;
Singh, Parminder ;
Nayyar, Anand ;
Kaur, Navdeep ;
Bhatia, Kamaljit Singh ;
El-Sappagh, Shaker ;
Hu, Jong-Wan .
IEEE ACCESS, 2020, 8 :125909-125922
[34]   User Identification Using Keystroke Dynamics [J].
Can, Yekta Said ;
Alagoz, Fatih .
2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, :1083-1085
[35]   Continuous Keystroke Dynamics-Based User Authentication Using Modified Hausdorff Distance [J].
Zhuravskii, Maksim ;
Kazachuk, Maria ;
Petrovskiy, Mikhail ;
Mashechkin, Igor .
DATABASE SYSTEMS FOR ADVANCED APPLICATIONS: DASFAA 2021 INTERNATIONAL WORKSHOPS, 2021, 12680 :223-236
[36]   Keystroke Dynamics Based User Authentication and its Application in Online Examination [J].
Chen, Zhaohang ;
Cai, Hongming ;
Jiang, Lihong ;
Zou, WenYun ;
Zhu, Wendong ;
Fei, Xiang .
PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD), 2021, :649-654
[37]   Sequence Alignment of Dynamic Intervals for Keystroke Dynamics based User Authentication [J].
Ho, Jiacang ;
Kang, Dae-Ki .
2014 JOINT 7TH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND INTELLIGENT SYSTEMS (SCIS) AND 15TH INTERNATIONAL SYMPOSIUM ON ADVANCED INTELLIGENT SYSTEMS (ISIS), 2014, :1433-1438
[38]   Feature Selection and Representation of Evolutionary Algorithm on Keystroke Dynamics [J].
Baynath, Purvashi ;
Soyjaudah, Sunjiv ;
Khan, Maleika Heenaye-Mamode .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (04) :651-661
[39]   A dexterous feature selection artificial immune system algorithm for keystroke dynamics [J].
Chandrasekar, V. ;
Kumar, S. Suresh .
STOCHASTIC ANALYSIS AND APPLICATIONS, 2016, 34 (01) :147-154
[40]   Secure and Robust User Authentication Using Transfer Learning and CTGAN-based Keystroke Dynamics [J].
AbdelRaouf, Hussien ;
Fouda, Mostafa M. ;
Ibrahem, Mohamed I. .
2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,