Learning User Keystroke Patterns for Authentication

被引:0
|
作者
Zhao, Ying [1 ]
机构
[1] RMIT Univ Australia, Sch Comp Sci & Informat Technol, Melbourne, Vic 3001, Australia
关键词
Keystroke Authentication; Pattern recognition; Machine Learning; Instance-based Learning; Bayesian; Decision Tree;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Keystroke authentication is a new access control system to identify legitimate users via their typing behavior. In this paper, machine learning techniques are adapted for keystroke authentication. Seven learning methods are used to build models to differentiate user keystroke patterns. The selected classification methods are Decision Tree, Naive Bayesian, Instance Based Learning, Decision Table, One Rule, Random Tree and K-star. Among these methods, three of them are studied in more details. The results show that machine learning is a feasible alternative for keystroke authentication. Compared to the conventional Nearest Neighbour method in the recent research, learning methods especially Decision Tree can be more accurate. In addition, the experiment results reveal that 3-Grams is more accurate than 2-Grams and 4-Grams for feature extraction. Also, combination of attributes tend to result higher accuracy.
引用
收藏
页码:65 / 70
页数:6
相关论文
共 50 条
  • [21] A parallel decision tree-based method for user authentication-based on keystroke patterns
    Sheng, Y
    Phoha, VV
    Rovnyak, SM
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2005, 35 (04): : 826 - 833
  • [22] User Authentication with Keystroke Dynamics using Fixed Text
    Rybnik, Mariusz
    Panasiuk, Piotr
    Saeed, Khalid
    ICBAKE: 2009 INTERNATIONAL CONFERENCE ON BIOMETRICS AND KANSEI ENGINEERING, 2009, : 70 - +
  • [23] Online User Authentication System Using Keystroke Dynamics
    Salem, Asma
    Jabri, Ahmad Sharieh Riad
    JOURNAL OF COMPUTER SECURITY, 2023, 31 (03) : 185 - 215
  • [24] Secure and Robust User Authentication Using Transfer Learning and CTGAN-based Keystroke Dynamics
    AbdelRaouf, Hussien
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [25] A Bioinformatics Based Approach to User Authentication via Keystroke Dynamics
    Revett, Kenneth
    INTERNATIONAL JOURNAL OF CONTROL AUTOMATION AND SYSTEMS, 2009, 7 (01) : 7 - 15
  • [26] Studying of keystroke dynamics statistical properties for biometric user authentication
    Alieksieiev, Vasyl
    Strelnitskiy, Aleksey
    Gavva, Dmitry
    Gorelov, Denis
    Synytsia, Yuliia
    2018 14TH INTERNATIONAL CONFERENCE ON ADVANCED TRENDS IN RADIOELECTRONICS, TELECOMMUNICATIONS AND COMPUTER ENGINEERING (TCSET), 2018, : 559 - 563
  • [27] Anomaly Detection Approach to Keystroke Dynamics Based User Authentication
    Ivannikova, Elena
    David, Gil
    Hamalainen, Timo
    2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2017, : 885 - 889
  • [28] Keystroke based User Authentication using Modified Differential Evolution
    Krishna, Gutha Jaya
    Ravi, Vadlamani
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 739 - 744
  • [29] Keystroke Dynamics Based User Authentication using Numeric Keypad
    Saini, Baljit Singh
    Kaur, Navdeep
    Bhatia, Kamaljit Singh
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING (CONFLUENCE 2017), 2017, : 25 - 29
  • [30] On the use of rough sets for user authentication via keystroke dynamics
    Revett, Kenneth
    de Magalhaes, Sergio Tenreiro
    Santos, Henrique M. D.
    PROGRESS IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2007, 4874 : 145 - +