Learning User Keystroke Patterns for Authentication

被引:0
|
作者
Zhao, Ying [1 ]
机构
[1] RMIT Univ Australia, Sch Comp Sci & Informat Technol, Melbourne, Vic 3001, Australia
关键词
Keystroke Authentication; Pattern recognition; Machine Learning; Instance-based Learning; Bayesian; Decision Tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Keystroke authentication is a new access control system to identify legitimate users via their typing behavior. In this paper, machine learning techniques are adapted for keystroke authentication. Seven learning methods are used to build models to differentiate user keystroke patterns. The selected classification methods are Decision Tree, Naive Bayesian, Instance Based Learning, Decision Table, One Rule, Random Tree and K-star. Among these methods, three of them are studied in more details. The results show that machine learning is a feasible alternative for keystroke authentication. Compared to the conventional Nearest Neighbour method in the recent research, learning methods especially Decision Tree can be more accurate. In addition, the experiment results reveal that 3-Grams is more accurate than 2-Grams and 4-Grams for feature extraction. Also, combination of attributes tend to result higher accuracy.
引用
收藏
页码:65 / 70
页数:6
相关论文
共 50 条
  • [1] A machine learning approach to keystroke dynamics based user authentication
    Revett, Kenneth
    Gorunescu, Florin
    Gorunescu, Marina
    Ene, Marius
    de Magalhaes, Sergio Tenreiro
    Dinis Santos, Henrique M.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2007, 1 (01) : 55 - 70
  • [2] Keystroke Biometric Systems for User Authentication
    Md Liakat Ali
    John V. Monaco
    Charles C. Tappert
    Meikang Qiu
    Journal of Signal Processing Systems, 2017, 86 : 175 - 190
  • [3] Keystroke Biometric Systems for User Authentication
    Ali, Md Liakat
    Monaco, John V.
    Tappert, Charles C.
    Qiu, Meikang
    JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2017, 86 (2-3): : 175 - 190
  • [4] User Authentication Based on Keystroke Dynamics
    Das, Rajat Kumar
    Mukhopadhyay, Sudipta
    Bhattacharya, Puranjoy
    IETE JOURNAL OF RESEARCH, 2014, 60 (03) : 229 - 239
  • [5] User classiflcation for keystroke dynamics authentication
    Hocquet, Sylvain
    Ramel, Jean-Yves
    Cardot, Hubert
    ADVANCES IN BIOMETRICS, PROCEEDINGS, 2007, 4642 : 531 - +
  • [6] User Authentication Using Keystroke Recognition
    Garg, Urvashi
    Meena, Yogesh Kumar
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, 2013, 174 : 131 - 136
  • [7] Keystroke Dynamics Analysis for User Authentication Using a Deep Learning Approach
    Altwaijry, Najwa
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (12): : 209 - 216
  • [8] Outlier detection for keystroke biometric user authentication
    Ismail M.G.
    Salem M.A.-M.
    El Ghany M.A.A.
    Aldakheel E.A.
    Abbas S.
    PeerJ Computer Science, 2024, 10
  • [9] Outlier detection for keystroke biometric user authentication
    Ismail, Mahmoud G.
    Salem, Mohammed A. -M.
    Abd El Ghany, Mohamed A.
    Aldakheel, Eman Abdullah
    Abbas, Safia
    PEERJ COMPUTER SCIENCE, 2024, 10
  • [10] A Comparison of Keystroke Dynamics Techniques for User Authentication
    Anusas-amornkul, Tanapat
    Wangsuk, Kasem
    2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 45 - 49