An Efficient Feature Selection Technique for User Authentication using Keystroke Dynamics

被引:0
作者
Shanmugapriya, D. [1 ]
Padmavathi, G. [2 ]
机构
[1] Avinashilingam Inst Home Sci & Higher Educ women, Dept Informat Technol, Coimbatore, Tamil Nadu, India
[2] Avinashilingam Inst Home Sci & Higher Educ women, Dept Comp Sci, Coimbatore, Tamil Nadu, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2011年 / 11卷 / 10期
关键词
Keystroke Dynamics; Z-Score; Feature Selection; Ant colony Optimization (ACO); Particle Swarm Optimization (PSO); Genetic Algorithm (GA); Extreme Learning Machine (ELM).Virtual Key Force;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing the sensitive data and computer systems by allowing ease access to authenticated users an d withstanding the attacks of imposters is one of the major challenges in the field of computer security. ID and password are the most widely used method for authenticating the computer systems. But, this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary dttack, guessing, phishing and many more. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identifies the authenticity of a user when the user is working via a keyboard. Keystroke features like dwell time, flight time, di-graph, tri-graph and virtual key force of every user are used in this paper. For the purpose of preprocessing Z-Score method is used. Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Genetic Algorithm (GA) algorithm is used with Extreme Learning Machine (ELM) for feature subset selection. In order to classify the obtained results ELM algorithm is used. Comparison of ACO, PSO and GA with ELM respectively is done to find the best method for feature subset selection. From the results, it is revealed that ACO with ELM is best for feature subset selection.
引用
收藏
页码:191 / 195
页数:5
相关论文
共 50 条
[41]   A dexterous feature selection artificial immune system algorithm for keystroke dynamics [J].
Chandrasekar, V. ;
Kumar, S. Suresh .
STOCHASTIC ANALYSIS AND APPLICATIONS, 2016, 34 (01) :147-154
[42]   A New Feature Scoring Method in Keystroke Dynamics-Based User Authentications [J].
Kim, Dong In ;
Lee, Shincheol ;
Shin, Ji Sun .
IEEE ACCESS, 2020, 8 :27901-27914
[43]   Secure and Robust User Authentication Using Transfer Learning and CTGAN-based Keystroke Dynamics [J].
AbdelRaouf, Hussien ;
Fouda, Mostafa M. ;
Ibrahem, Mohamed I. .
2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
[44]   Keystroke dynamics-based user authentication service for cloud computing [J].
Abo-alian, Alshaimaa ;
Badr, Nagwa L. ;
Tolba, M. F. .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2016, 28 (09) :2567-2585
[45]   Robot Adversarial Attack on Keystroke Dynamics Based User Authentication System [J].
Yu, Rongyu ;
Kizilkaya, Burak ;
Meng, Zhen ;
Li, Emma ;
Zhao, Philip .
IEEE ROBOTICS AND AUTOMATION LETTERS, 2025, 10 (05) :4850-4857
[46]   Normalizing variations in feature vector structure in keystroke dynamics authentication systems [J].
Syed, Zahid ;
Banerjee, Sean ;
Cukic, Bojan .
SOFTWARE QUALITY JOURNAL, 2016, 24 (01) :137-157
[47]   Keystroke based User Authentication using Modified Differential Evolution [J].
Krishna, Gutha Jaya ;
Ravi, Vadlamani .
PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, :739-744
[48]   Normalizing variations in feature vector structure in keystroke dynamics authentication systems [J].
Zahid Syed ;
Sean Banerjee ;
Bojan Cukic .
Software Quality Journal, 2016, 24 :137-157
[49]   Biometric Authentication and Identification using Keystroke Dynamics: A Survey [J].
Banerjee, Salil P. ;
Woodard, Damon L. .
JOURNAL OF PATTERN RECOGNITION RESEARCH, 2012, 7 (01) :116-139
[50]   Sensing Pressure for Authentication System Using Keystroke Dynamics [J].
Nonaka, Hidetoshi ;
Kurihara, Masahito .
PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 1, 2007, 1 :16-19