One-class naïve Bayes with duration feature ranking for accurate user authentication using keystroke dynamics

Biometric-based approaches, including keystroke dynamics on keyboards, mice, and mobile devices, have incorporated machine learning algorithms to learn users’ typing behavior for authentication systems. Among the machine learning algorithms, one-class naïve Bayes (ONENB) has been shown to be effective when it is applied to anomaly tests; however, there have been few studies on applying the ONENB algorithm to keystroke dynamics-based authentication. We applied the ONENB algorithm to calculate the likelihood of attributes in keystroke dynamics data. Additionally, we propose the speed inspection in typing skills (SITS) algorithm designed from the observation that every person has a different typing speed on specific keys. These specific characteristics, also known as the keystroke’s index order, can be used as essential patterns for authentication systems to distinguish between a genuine user and imposter. To further evaluate the effectiveness of the SITS algorithm and examine the quality of each attribute type (e.g., dwell time and flight time), we investigated the influence of attribute types on the keystroke’s index order. From the experimental results of the proposed algorithms and their combination, we observed that the shortest/longest time attributes and separation of the attributes are useful for enhancing the performance of the proposed algorithms.

[1]  Christophe Rosenberger,et al.  Soft Biometrics for Keystroke Dynamics , 2013, ICIAR.

[2]  Bojan Cukic,et al.  Leveraging Variations in Event Sequences in Keystroke-Dynamics Authentication Systems , 2014, 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering.

[3]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[4]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[5]  Christophe Rosenberger,et al.  A new soft biometric approach for keystroke dynamics based on gender recognition , 2012, Int. J. Inf. Technol. Manag..

[6]  Duan Liguo,et al.  A New Naive Bayes Text Classification Algorithm , 2014 .

[7]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[8]  Sebastian Möller,et al.  Identity theft, computers and behavioral biometrics , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[9]  Sattar B. Sadkhan,et al.  Biometric voice authentication auto-evaluation system , 2017, 2017 Annual Conference on New Trends in Information & Communications Technology Applications (NTICT).

[10]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[11]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[12]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[13]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[14]  Rafal Doroz,et al.  Electronic Health Record Security Based on Ensemble Classification of Keystroke Dynamics , 2016, Appl. Artif. Intell..

[15]  Kenneth Revett A Bioinformatics Based Approach to Behavioural Biometrics , 2007, 2007 Frontiers in the Convergence of Bioscience and Information Technologies.

[16]  Dae-Ki Kang,et al.  Sequence alignment of dynamic intervals for keystroke dynamics based user authentication , 2014, 2014 Joint 7th International Conference on Soft Computing and Intelligent Systems (SCIS) and 15th International Symposium on Advanced Intelligent Systems (ISIS).

[17]  Sungzoon Cho,et al.  Keystroke dynamics-based user authentication using long and free text strings from various input devices , 2015, Inf. Sci..

[18]  Kenneth Revett A bioinformatics based approach to user authentication via keystroke dynamics , 2009 .

[19]  Jean-Yves Ramel,et al.  Fusion of methods for keystroke dynamic authentication , 2005, Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID'05).

[20]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[21]  G. D'Agostini,et al.  A Multidimensional unfolding method based on Bayes' theorem , 1995 .

[22]  Mudhafar M. Al-Jarrah An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity , 2012 .

[23]  Dae-Ki Kang,et al.  Sequence Alignment with Dynamic Divisor Generation for Keystroke Dynamics Based User Authentication , 2015, J. Sensors.

[24]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[25]  Christophe Rosenberger,et al.  Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[26]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[27]  Mohammad S. Obaidat,et al.  Performance of the perceptron algorithm for the classification of computer users , 1992, SAC '92.

[28]  Jugurta R. Montalvão Filho,et al.  Contributions to empirical analysis of keystroke dynamics in passwords , 2015, Pattern Recognit. Lett..

[29]  Ibrahim Sogukpinar,et al.  Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..

[30]  Marcus Brown,et al.  A practical approach to user authentication , 1994, Tenth Annual Computer Security Applications Conference.

[31]  Kevin Warwick,et al.  Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..

[32]  Xuan Wang,et al.  User authentication via keystroke dynamics based on difference subspace and slope correlation degree , 2012, Digit. Signal Process..