Analysis of Authentication System Based on Keystroke Dynamics

Currently, almost any kind of data is stored on the Internet, which makes security issues of the private data very crucial. The main objective of this paper is to analyze multimodal authentication security systems that are combined with keystroke dynamics (KSD). The keystroke dynamics are one of the behavioral biometrics which describes the typing rhythm of the individual. The proposed work aimed to design a multimodal authentication system using a machine learning/deep learning algorithm for user classification based on traditional and touchscreen features of keystroke dynamics. The results have shown that XGBoost has a higher overall classification accuracy (90.91%) in comparison with the previous works (85.90%) on the same dataset. Confusion Matrix and Receiver Operating Characteristics (ROC) curves were derived for further performance evaluation of the system. Area Under the Curve (AUC) values for each of the classes and for the whole classifier were also reported.

[1]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[2]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[3]  Ian F. Blake,et al.  Computer security and protection structures , 1977 .

[4]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[5]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[6]  Ana Carolina Lorena,et al.  A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.

[7]  J. S. Cramer The Origins of Logistic Regression , 2002 .

[8]  M. S. Obaidat,et al.  Keystroke Dynamics Based Authentication , 1996 .

[9]  Mohammad S. Obaidat,et al.  Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..

[10]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[11]  Harry Zhang,et al.  The Optimality of Naive Bayes , 2004, FLAIRS.

[12]  Margit Antal,et al.  Keystroke Dynamics on Android Platform , 2015 .

[13]  Mohammad S. Obaidat,et al.  A novel security scheme for behavioral authentication systems based on keystroke dynamics , 2019, Secur. Priv..

[14]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[15]  Mohammad S. Obaidat,et al.  Security of e-Systems and Computer Networks , 2007 .

[16]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[17]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.