Multi-Model authentication using keystroke dynamics for Smartphones

By the year 2018 it is predicted that 84% of the total world’s population would own a smartphone device. Intruders that gain access to someone’s phone can easily obtain personal and sensitive data about them, such as emails and messages, or even impersonate the rightful owner. Although an intruder can easily get the owner’s smartphone’s password by looking over their shoulder, it would be very hard for them to match the owner’s typing signature. However if the owner’s typing signature is only based on one typing mode, such as standing still and typing with one hand, it would be very inconvenient for the owner to always stand still and type with one hand as otherwise they’d likely be marked as intruders and get frustrated over time. This research addresses exactly this. We found that models covering different typing modes and activities such as standing or moving and typing one handed or two handed, can be achieved with Equal Error Rate values as low as 0.44%. The best results were achieved using a Least Squares SVM classifier with RBF kernel. We also explore and discuss any differences in classifying between typing activities, Digraphs vs Trigraphs, feature importance, misclassification analyses and full typing sessions vs sentence by sentence based classification.

[1]  P Massey,et al.  The danger within. , 1989, Nursing times.

[2]  Chih-Jen Lin,et al.  A Practical Guide to Support Vector Classication , 2008 .

[3]  M. Curty Quantum cryptography: Know your enemy , 2014 .

[4]  Masahito Kurihara,et al.  Sensing Pressure for Authentication System Using Keystroke Dynamics , 2004, International Conference on Computational Intelligence.

[5]  Matthias Trojahn BIOMETRIC AUTHENTICATION THROUGH A VIRTUAL KEYBOARD FOR SMARTPHONES , 2012 .

[6]  Dawn Xiaodong Song,et al.  Touchalytics: On the Applicability of Touchscreen Input as a Behavioral Biometric for Continuous Authentication , 2012, IEEE Transactions on Information Forensics and Security.

[7]  Samad Ahmadi,et al.  Securing smartphones via typing heat maps , 2016, 2016 IEEE 6th International Conference on Consumer Electronics - Berlin (ICCE-Berlin).

[8]  Yuan Feng,et al.  User Identification and Authentication Using Keystroke Dynamics with Acoustic Signal , 2016, 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN).

[9]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[10]  Liang Tang,et al.  User Identification Based on Force-Sensing Keypad by Force-Space-Time Method , 2011 .

[11]  Andrew Beng Jin Teoh,et al.  Keystroke dynamics in password authentication enhancement , 2010, Expert Syst. Appl..

[12]  Nasir D. Memon,et al.  DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices , 2017, Comput. Secur..

[13]  Yan Lindsay Sun,et al.  Anatomy of secondary features in keystroke dynamics - achieving more with less , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).