Keystroke Dynamics User Authentication Using Advanced Machine Learning Methods

@inproceedings{Deng2015KeystrokeDU,
  title={Keystroke Dynamics User Authentication Using Advanced Machine Learning Methods},
  author={Yunbin Deng and Yu Zhong},
  year={2015}
}
User authentication based on typing patterns offers many advantages in the domain of cyber security, including data acquisition without extra hardware requirement, continuous monitoring as the keys are typed, and non-intrusive operation with no interruptions to a user’s daily work. In this chapter, we adopt three popular voice biometrics algorithms to perform keystroke dynamics based user authentication, namely, 1) Gaussian Mixture Model with Universal Background Model (GMM-UBM), 2) identity… Expand
Keystroke Dynamics using Auto Encoders
TLDR
This paper will look at an Autoencoder model for learning the keystroke dynamics of specific users, which shows an improvement over the traditional tried and tested statistical approaches with an Equal Error Rate of 6.51%, with the additional benefits of relatively low training times and less reliance on feature engineering. Expand
A Framework for Improving the Accuracy of Keystroke Dynamics-Based Biometric Authentication Using Soft Computing Techniques
The global access of information and resources from anywhere has increased the chance of intrusion and hacking of confidential data. Username with password is the commonly used authenticationExpand
Robust Keystroke Biometric Anomaly Detection
TLDR
This paper describes the fifteen best-performing anomaly detection systems submitted to the KBOC, which ranged from auto-encoding neural networks to ensemble methods, and achieved the lowest equal error rate of 5.32%, while all fifteen systems performed better than any other submission. Expand
Biometrie authentication using keystroke dynamics
TLDR
This paper focuses on use of keystroke dynamics as biometric functionality for user identification and verification of username and password holders using mean and standard deviation method. Expand
Confounding Factors in Keystroke Dynamics
TLDR
In this research, a taxonomy of Confounding Factors is proposed, and several mitigation actions are discussed to face them. Expand
Biometric studies with hidden Markov model and its extension on short fixed-text input
  • M. Ali, John V. Monaco, C. Tappert
  • Computer Science
  • 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON)
  • 2017
TLDR
The POHMM, an extension of HMM that conditions the hidden state on an independent Markov chain, achieves a 0.045 equal-error rate (ERR), a significant performance improvement over the HMM and other leading methods in user verification. Expand

References

SHOWING 1-10 OF 62 REFERENCES
Keystroke Dynamics User Authentication Based on Gaussian Mixture Model and Deep Belief Nets
TLDR
The Gaussian mixture model with the universal background model (GMM-UBM) and the deep belief nets (DBN) are introduced, which are two generative model-based approaches to user authentication using keystroke dynamics that make no assumption about the underlying probability distribution and are fast for training and testing. Expand
Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications
TLDR
A novel up--up keystroke latency (UUKL) feature is proposed and its performance with existing features is compared using a Gaussian mixture model (GMM)-based verification system that utilizes an adaptive and user-specific threshold based on the leave-one-out method (LOOM). Expand
User authentication through keystroke dynamics
TLDR
This paper presents an original measure for keystroke dynamics that limits the instability of this biometric feature, and has tested this approach on 154 individuals. Expand
Continual Retraining of Keystroke Dynamics Based Authenticator
TLDR
The experimental results show that both the moving window and the growing window approach outperform the fixed window approach, which does not retrain a classifier. Expand
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
TLDR
The use and acceptance of this biometric could be increased by development of standardized databases, assignment of nomenclature for features, development of common data interchange formats, establishment of protocols for evaluating methods, and resolution of privacy issues. Expand
Typing Biometrics: Impact of Human Learning on Performance Quality
TLDR
This study investigates the validity of the assumption that typing biometric patterns are stable over time by analyzing how students’ typing patterns behave over time and demonstrates that typing patterns change over time due to learning resulting in several performance quality challenges. Expand
Keystroke dynamics for user authentication
TLDR
In this paper, a new distance metric that is effective in dealing with the challenges intrinsic to keystroke dynamics data, i.e., scale variations, feature interactions and redundancies, and outliers is proposed. Expand
User authentication through typing biometrics features
TLDR
A static keystroke dynamics in user authentication using four features to authenticate users so that the usual login-password authentication when the password is no more a secret can be improved. Expand
A multi-technique approach for user identification through keystroke dynamics
  • S. Haider, A. Abbas, A. K. Zaidi
  • Computer Science
  • Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0
  • 2000
TLDR
The paper presents a suite of techniques for password authentication using neural networks, fuzzy logic, statistical methods, and several hybrid combinations of these approaches to identify a user. Expand
Continuous Biometric Authentication: Can It Be More Practical?
TLDR
The aim of this paper is to identify the limitations in current CBAS in order to make them more practical for real world applications and discuss a new application for CBAS not requiring any training data either from intruders or from valid users. Expand
...
1
2
3
4
5
...