Comparing anomaly-detection algorithms for keystroke dynamics

@article{Killourhy2009ComparingAA,
  title={Comparing anomaly-detection algorithms for keystroke dynamics},
  author={Kevin S. Killourhy and Roy A. Maxion},
  journal={2009 IEEE/IFIP International Conference on Dependable Systems \& Networks},
  year={2009},
  pages={125-134}
}
Keystroke dynamics-the analysis of typing rhythms to discriminate among users-has been proposed for detecting impostors (i.e., both insiders and external attackers). Since many anomaly-detection algorithms have been proposed for this task, it is natural to ask which are the top performers (e.g., to identify promising research directions). Unfortunately, we cannot conduct a sound comparison of detectors using the results in the literature because evaluation conditions are inconsistent across… Expand
Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection
TLDR
This paper aims to benchmark the algorithms in the same dataset and feature in order to measure the performance on an equal level, and develops a way to process the typing data, and test the algorithms on open set. Expand
Isolated forest in keystroke dynamics-based authentication: Only normal instances available for training
TLDR
This paper applies a new outlier detection algorithms, which have not been used for keystroke dynamics before: Isolation Forest (iForest), which shows better performance than two other approach, especially when the number of training sample is less, both concerning accuracy and time complexity. Expand
Robust Keystroke Biometric Anomaly Detection
TLDR
This paper describes the fifteen best-performing anomaly detection systems submitted to the KBOC, which ranged from auto-encoding neural networks to ensemble methods, and achieved the lowest equal error rate of 5.32%, while all fifteen systems performed better than any other submission. Expand
Performance evaluation of anomaly-detection algorithms for mouse dynamics
TLDR
A performance-evaluation study of a range of anomaly-detection algorithms in mouse dynamics on an equal basis and the results constitute a benchmark for comparing detectors and measuring progress. Expand
Anomaly detection approach to keystroke dynamics based user authentication
TLDR
This work designed a cross validation procedure with artificially generated impostor samples that improves the learning process yet allows fair comparison to previous works, and applied a k-NN-based approach that demonstrated strong results. Expand
Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach
TLDR
This work evaluated the most used features and evaluated which ones are more significant to differentiate a user from another using keystroke dynamics, and tested the impact on two benchmark databases applying bio-inspired algorithms based on neural networks and artificial immune systems. Expand
Intrusion Detection Using Keystroke Dynamics
TLDR
An improved technique for authorized access to computer system resources and data via keystroke dynamics is presented, providing an inexpensive method of intrusion detection as compared to other behavioral biometric methods. Expand
A scientific understanding of keystroke dynamics
TLDR
This work established that understanding the influential factors is critical to making progress in keystroke dynamics, and can reliably predict classifier error rates, and its approach is general. Expand
A Comparison of Authentication Methods via Keystroke Dynamics
TLDR
Evaluated the performance of the most representative classifiers in two of the three most common approaches used in keystroke dynamics using the public Greyc dataset reveal that machine-learning based approaches outperformed the distance-based techniques. Expand
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms
TLDR
The implementation of keystroke biometrics to enhance security using machine-learning algorithms on both Windows and Android and implements machine learning on tap dynamics in Android, allowing both training and prediction and overcoming its computational restrictions. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
Continual Retraining of Keystroke Dynamics Based Authenticator
TLDR
The experimental results show that both the moving window and the growing window approach outperform the fixed window approach, which does not retrain a classifier. Expand
Retraining a keystroke dynamics-based authenticator with impostor patterns
TLDR
Experimental results show that retraining improves the authentication performance and that learning vector quantization for novelty detection outperforms other widely used novelty detectors. Expand
Computer-Access Security Systems Using Keystroke Dynamics
TLDR
By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested. Expand
Authentication by Keystroke Timing: Some Preliminary Results
TLDR
The authors found that of the large number of digraphs represented in most ordinary paragraphs, there were five which could serve as a basis for distinguishing among the subjects, and that this method of distinguishing subjects might provide the basis for a computer authentication system. Expand
GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification
  • Enzhe Yu, S. Cho
  • Computer Science
  • Proceedings of the International Joint Conference on Neural Networks, 2003.
  • 2003
TLDR
An automatic feature subset selection process that can automatically selects a relevant subset of features and ignores the rest, thus producing a better accuracy in password detection accuracy is proposed. Expand
Web-Based Keystroke Dynamics Identity Verification Using Neural Network
TLDR
An autoassociator neural network is proposed that is trained with the timing vectors of the owner's keystroke dynamics and then used to discriminate between the owner and an imposter. Expand
User authentication through typing biometrics features
TLDR
A static keystroke dynamics in user authentication using four features to authenticate users so that the usual login-password authentication when the password is no more a secret can be improved. Expand
User authentication through typing biometrics features
TLDR
A static keystroke dynamics in user authentication using four features to authenticate users so that the usual login-password authentication when the password is no more a secret can be improved. Expand
Equalization of keystroke timing histograms for improved identification performance
TLDR
The results corroborate with the hypothesis that the nonlinear memoryless time interval transform proposed here, despite its simplicity, can be a useful and almost costless building block in keystroke-based biometric systems. Expand
Personal Attributes Authentication Techniques.
TLDR
Arguments which indicate that the handprint results can be improved significantly and the c-trace moderately are given are given, and results were quite encouraging. Expand
...
1
2
3
...