COMPUTER SCIENCE AND TECHNOLOGY |
|
|
|
|
|
Free-text keystroke continuous authentication using CNN and RNN |
LU Xiaofeng1, ZHANG Shengfei1, YI Shengwei2 |
1. School of Cyberspace Security, Beijing University of Post and Telecommunications, Beijing 100876, China; 2. China Information Technology Security Evaluation Center, Beijing 100085, China |
|
|
Abstract Personal keystroke input patterns are difficult to imitate and can be used for identity authentication. The personal keystroke input data for a free-text can be used to learn the unique keystroke mode of a person. Detection based on a user's free-text keystrokes can be used for continuous identity authentication without affecting the user input. This paper presents a model that divides the keystroke data into fixed-length keystroke sequences and converts the keystroke time data in the keystroke sequence into a keystroke vector according to the time characteristics of the keystrokes. A convolutional neural network and a recurrent neural network are then used to learn the sequences of the personal keystroke vectors for identity authentication. The model was tested on an open data set with an optimal false rejection rate (FRR) of 1.95%, a false acceptance rate (FAR) of 4.12%, and an equal error rate (EER) of 3.04%.
|
Keywords
authentication
keystroke dynamics
free-text
convolutional neural networks
recurrent neural networks
|
Issue Date: 13 December 2018
|
|
|
[1] BERGADANO F, GUNETTI D, PICARDI C. User authentication through keystroke dynamics[J]. ACM Transactions on Information and System Security, 2002, 5(4):367-397. [2] MAAS A, HEATHER C, DO C T, et al. Offering verified credentials in massive open online courses:MOOCs and technology to advance learning and learning research (Ubiquity Symposium)[J]. Ubiquity, 2014, 2014(5):1-11. [3] RYBNIK M, TABEDZKI M, ADAMSKI M, et al. An exploration of keystroke dynamics authentication using non-fixed text of various length[C]//Proceedings of 2013 International Conference on Biometrics and Kansei Engineering. Tokyo, Japan:IEEE, 2013:245-250. [4] ALSHANKETI F, TRAORE I, AHMED A A. Improving performance and usability in mobile keystroke dynamic biometric authentication[C]//Proceedings of 2016 IEEE Security and Privacy Workshops. San Jose, USA:IEEE, 2016:66-73. [5] ALI M L, THAKUR K, TAPPERT C C, et al. Keystroke biometric user verification using hidden Markov model[C]//Proceedings of 2016 IEEE International Conference on Cyber Security and Cloud Computing. Beijing, China:IEEE, 2016:204-209. [6] YADAV J, PANDEY K, GUPTA S, et al. Keystroke dynamics based authentication using fuzzy logic[C]//Proceedings of 2017 International Conference on Contemporary Computing. Noida, India:IEEE, 2017:1-6. [7] MAXION R A, KILLOURHY K S. Keystroke biometrics with number-pad input[C]//Proceedings of 2010 IEEE/IFIP International Conference on Dependable Systems & Networks. Chicago, USA:IEEE, 2010:201-210. [8] KAMBOURAKIS G, DAMOPOULOS D, PAPAMARTZIVANOS D, et al. Introducing touchstroke:Keystroke-based authentication system for smartphones[J]. Security and Communication Networks, 2016, 9(6):542-554. [9] ANTAL M, SZABÓ L Z. An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices[C]//Proceedings of 2015 International Conference on Control Systems and Computer Science. Bucharest, Romania:IEEE, 2015:343-350. [10] BOURS P. Continuous keystroke dynamics:A different perspective towards biometric evaluation[J]. Information Security Technical Report, 2012, 17(1-2):36-43. [11] HUANG J J, HOU D Q, SCHUCKERS S, et al. Effect of data size on performance of free-text keystroke authentication[C]//Proceedings of 2015 IEEE International Conference on Identity, Security and Behavior Analysis. Hong Kong, China:IEEE, 2015:1-7. [12] SUN Y, CEKER H, UPADHYAYA S. Shared keystroke dataset for continuous authentication[C]//Proceedings of 2016 IEEE International Workshop on Information Forensics and Security. Abu Dhabi, United Arab Emirates:IEEE, 2016:1-6. [13] VURAL E, HUANG J J, HOU D Q, et al. Shared research dataset to support development of keystroke authentication[C]//Proceedings of 2014 IEEE International Joint Conference on Biometrics. Clearwater, USA:IEEE, 2014:1-8. [14] GUNETTI D, PICARDI C. Keystroke analysis of free text[J]. ACM Transactions on Information and System Security, 2005, 8(3):312-347. [15] MURPHY C, HUANG J J, HOU D Q, et al. Shared dataset on natural human-computer interaction to support continuous authentication research[C]//Proceedings of 2017 IEEE International Joint Conference on Biometrics. Denver, USA:IEEE, 2017:525-530. [16] HUANG J J, HOU D Q, SCHUCKERS S, et al. Benchmarking keystroke authentication algorithms[C]//Proceedings of 2017 IEEE Workshop on Information Forensics and Security. Rennes, France:IEEE, 2017:1-6. [17] SHIMSHON T, MOSKOVITCH R, ROKACH L, et al. Continuous verification using keystroke dynamics[C]//Proceedings of 2010 International Conference on Computational Intelligence and Security. Nanning, China:IEEE, 2010:411-415. [18] AHMED A A, TRAORE I. Biometric recognition based on free-text keystroke dynamics[J]. IEEE Transactions on Cybernetics, 2014, 44(4):458-472. [19] PUTRI A N, ASNAR Y D W, AKBAR S. A continuous fusion authentication for Android based on keystroke dynamics and touch gesture[C]//Proceedings of 2016 International Conference on Data and Software Engineering. Denpasar, Indonesia:IEEE, 2016:1-6. [20] LI B R, SUN H, GAO Y, et al. Enhanced free-text keystroke continuous authentication based on dynamics of wrist motion[C]//Proceedings of 2017 IEEE Workshop on Information Forensics and Security. Rennes, France:IEEE, 2017:1-6. |
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|