Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2018, Vol. 58 Issue (12) : 1072-1078     DOI: 10.16511/j.cnki.qhdxxb.2018.26.048
COMPUTER SCIENCE AND TECHNOLOGY |
Free-text keystroke continuous authentication using CNN and RNN
LU Xiaofeng1, ZHANG Shengfei1, YI Shengwei2
1. School of Cyberspace Security, Beijing University of Post and Telecommunications, Beijing 100876, China;
2. China Information Technology Security Evaluation Center, Beijing 100085, China
Download: PDF(2205 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Personal keystroke input patterns are difficult to imitate and can be used for identity authentication. The personal keystroke input data for a free-text can be used to learn the unique keystroke mode of a person. Detection based on a user's free-text keystrokes can be used for continuous identity authentication without affecting the user input. This paper presents a model that divides the keystroke data into fixed-length keystroke sequences and converts the keystroke time data in the keystroke sequence into a keystroke vector according to the time characteristics of the keystrokes. A convolutional neural network and a recurrent neural network are then used to learn the sequences of the personal keystroke vectors for identity authentication. The model was tested on an open data set with an optimal false rejection rate (FRR) of 1.95%, a false acceptance rate (FAR) of 4.12%, and an equal error rate (EER) of 3.04%.
Keywords authentication      keystroke dynamics      free-text      convolutional neural networks      recurrent neural networks     
Issue Date: 13 December 2018
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
LU Xiaofeng
ZHANG Shengfei
YI Shengwei
Cite this article:   
LU Xiaofeng,ZHANG Shengfei,YI Shengwei. Free-text keystroke continuous authentication using CNN and RNN[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(12): 1072-1078.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2018.26.048     OR     http://jst.tsinghuajournals.com/EN/Y2018/V58/I12/1072
  
  
  
  
  
  
  
  
  
  
  
[1] BERGADANO F, GUNETTI D, PICARDI C. User authentication through keystroke dynamics[J]. ACM Transactions on Information and System Security, 2002, 5(4):367-397.
[2] MAAS A, HEATHER C, DO C T, et al. Offering verified credentials in massive open online courses:MOOCs and technology to advance learning and learning research (Ubiquity Symposium)[J]. Ubiquity, 2014, 2014(5):1-11.
[3] RYBNIK M, TABEDZKI M, ADAMSKI M, et al. An exploration of keystroke dynamics authentication using non-fixed text of various length[C]//Proceedings of 2013 International Conference on Biometrics and Kansei Engineering. Tokyo, Japan:IEEE, 2013:245-250.
[4] ALSHANKETI F, TRAORE I, AHMED A A. Improving performance and usability in mobile keystroke dynamic biometric authentication[C]//Proceedings of 2016 IEEE Security and Privacy Workshops. San Jose, USA:IEEE, 2016:66-73.
[5] ALI M L, THAKUR K, TAPPERT C C, et al. Keystroke biometric user verification using hidden Markov model[C]//Proceedings of 2016 IEEE International Conference on Cyber Security and Cloud Computing. Beijing, China:IEEE, 2016:204-209.
[6] YADAV J, PANDEY K, GUPTA S, et al. Keystroke dynamics based authentication using fuzzy logic[C]//Proceedings of 2017 International Conference on Contemporary Computing. Noida, India:IEEE, 2017:1-6.
[7] MAXION R A, KILLOURHY K S. Keystroke biometrics with number-pad input[C]//Proceedings of 2010 IEEE/IFIP International Conference on Dependable Systems & Networks. Chicago, USA:IEEE, 2010:201-210.
[8] KAMBOURAKIS G, DAMOPOULOS D, PAPAMARTZIVANOS D, et al. Introducing touchstroke:Keystroke-based authentication system for smartphones[J]. Security and Communication Networks, 2016, 9(6):542-554.
[9] ANTAL M, SZABÓ L Z. An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices[C]//Proceedings of 2015 International Conference on Control Systems and Computer Science. Bucharest, Romania:IEEE, 2015:343-350.
[10] BOURS P. Continuous keystroke dynamics:A different perspective towards biometric evaluation[J]. Information Security Technical Report, 2012, 17(1-2):36-43.
[11] HUANG J J, HOU D Q, SCHUCKERS S, et al. Effect of data size on performance of free-text keystroke authentication[C]//Proceedings of 2015 IEEE International Conference on Identity, Security and Behavior Analysis. Hong Kong, China:IEEE, 2015:1-7.
[12] SUN Y, CEKER H, UPADHYAYA S. Shared keystroke dataset for continuous authentication[C]//Proceedings of 2016 IEEE International Workshop on Information Forensics and Security. Abu Dhabi, United Arab Emirates:IEEE, 2016:1-6.
[13] VURAL E, HUANG J J, HOU D Q, et al. Shared research dataset to support development of keystroke authentication[C]//Proceedings of 2014 IEEE International Joint Conference on Biometrics. Clearwater, USA:IEEE, 2014:1-8.
[14] GUNETTI D, PICARDI C. Keystroke analysis of free text[J]. ACM Transactions on Information and System Security, 2005, 8(3):312-347.
[15] MURPHY C, HUANG J J, HOU D Q, et al. Shared dataset on natural human-computer interaction to support continuous authentication research[C]//Proceedings of 2017 IEEE International Joint Conference on Biometrics. Denver, USA:IEEE, 2017:525-530.
[16] HUANG J J, HOU D Q, SCHUCKERS S, et al. Benchmarking keystroke authentication algorithms[C]//Proceedings of 2017 IEEE Workshop on Information Forensics and Security. Rennes, France:IEEE, 2017:1-6.
[17] SHIMSHON T, MOSKOVITCH R, ROKACH L, et al. Continuous verification using keystroke dynamics[C]//Proceedings of 2010 International Conference on Computational Intelligence and Security. Nanning, China:IEEE, 2010:411-415.
[18] AHMED A A, TRAORE I. Biometric recognition based on free-text keystroke dynamics[J]. IEEE Transactions on Cybernetics, 2014, 44(4):458-472.
[19] PUTRI A N, ASNAR Y D W, AKBAR S. A continuous fusion authentication for Android based on keystroke dynamics and touch gesture[C]//Proceedings of 2016 International Conference on Data and Software Engineering. Denpasar, Indonesia:IEEE, 2016:1-6.
[20] LI B R, SUN H, GAO Y, et al. Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion[C]//Proceedings of 2017 IEEE Workshop on Information Forensics and Security. Rennes, France:IEEE, 2017:1-6.
[1] DU Xiaochuang, LIANG Manchun, LI Ke, YU Yancheng, LIU Xin, WANG Xiangwei, WANG Rudong, ZHANG Guojie, FU Qi. A gamma radionuclide identification method based on convolutional neural networks[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 980-986.
[2] SONG Yubo, JING Xingyu, YAN Feng, HU Aiqun. Secure and energy efficient offloading of mobile edge computing in the Internet of vehicles[J]. Journal of Tsinghua University(Science and Technology), 2021, 61(11): 1246-1253.
[3] HAN Kun, PAN Haiwei, ZHANG Wei, BIAN Xiaofei, CHEN Chunling, HE Shuning. Alzheimer's disease classification method based on multi-modal medical images[J]. Journal of Tsinghua University(Science and Technology), 2020, 60(8): 664-671,682.
[4] LIN Peng, WEI Pengcheng, FAN Qixiang, CHEN Wenqi. CNN model for mining safety hazard data from a construction site[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(8): 628-634.
[5] LIU Qiong, LI Zongxian, SUN Fuchun, TIAN Yonghong, ZENG Wei. Image recognition and classification by deep belief-convolutional neural networks[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(9): 781-787.
[6] LIU Wu, WANG Yongke, SUN Donghong, REN Ping, LIU Ke. Login authentication vulnerability mining and improved login authentication method based on an open source intelligent terminal[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(9): 897-902.
[7] NING Bo, PEI Xiaoxia, LI Yuju, PEI Xinyu. Query authentications based on a fixed grid partitioning quad-tree index in LBS big data[J]. Journal of Tsinghua University(Science and Technology), 2016, 56(7): 785-792.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd