Competition between SOM Clusters to Model User Authentication System in Computer Networks

Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication through keystroke dynamics. Proposed architecture consists of a set of self organizing maps where each user has a distinct map. Each map consists of n neurons in the input layer where n is the length of a keystroke pattern; however to determine the number of neurons in the output layer, a strategy is proposed. For authenticating claimed user, probable user(s) for a given pattern and the degree of similarity between the map of the claimed user and a given pattern are determined. Finally, a decision on the authenticity is made using threshold criteria. Evaluation results show the best false accept rate of 0.88% when false reject rate was 3.55% with authentication accuracy of 97.83%. An application scenario of the method in a computer network environment is also presented.

[1]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[2]  Esa Alhoniemi,et al.  Clustering of the self-organizing map , 2000, IEEE Trans. Neural Networks Learn. Syst..

[3]  B. Miller,et al.  Vital signs of identity [biometrics] , 1994, IEEE Spectrum.

[4]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 2002, International Journal of Information Security.

[5]  Xavier Anguera Miró,et al.  Text independent speaker identification on noisy environments by means of self organizing maps , 1996, Proceeding of Fourth International Conference on Spoken Language Processing. ICSLP '96.

[6]  Anil K. Jain,et al.  Artificial Neural Networks: A Tutorial , 1996, Computer.

[7]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[8]  Hsinchun Chen,et al.  Internet Categorization and Search: A Self-Organizing Approach , 1996, J. Vis. Commun. Image Represent..

[9]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[10]  Teuvo Kohonen,et al.  The self-organizing map , 1990 .

[11]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[12]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[13]  Thomas J. Alexandre,et al.  Biometrics on smart cards: An approach to keyboard behavioral signature , 1997, Future Gener. Comput. Syst..

[14]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[15]  Simson L. Garfinkel,et al.  Email-Based Identification and Authentication: An Alternative to PKI? , 2003, IEEE Secur. Priv..

[16]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[17]  Stephen Grossberg,et al.  ARTMAP: supervised real-time learning and classification of nonstationary data by a self-organizing neural network , 1991, [1991 Proceedings] IEEE Conference on Neural Networks for Ocean Engineering.

[18]  Christine L. MacKenzie,et al.  Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[19]  Nick Bartlow,et al.  Username and Password Verification through Keystroke Dynamics , 2005 .

[20]  Thomas Villmann,et al.  Topology preservation in self-organizing feature maps: exact definition and measurement , 1997, IEEE Trans. Neural Networks.

[21]  Itshak Lapidot,et al.  Unsupervised speaker recognition based on competition between self-organizing maps , 2002, IEEE Trans. Neural Networks.

[22]  Mohammad S. Obaidat,et al.  A verification methodology for computer systems users , 1995, SAC '95.

[23]  Shashi Phoha,et al.  Computer User Authentication using Hidden Markov Model through Keystroke Dynamics , 2006 .

[24]  Yong Sheng,et al.  A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[25]  Jari Kangas,et al.  On the Analysis of Pattern Sequences by Self-Organizing Maps , 2007 .

[26]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[27]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[28]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[29]  John J. Leggett,et al.  Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..

[30]  Anil K. Jain,et al.  Artificial neural networks for feature extraction and multivariate data projection , 1995, IEEE Trans. Neural Networks.

[31]  Daw-Tung Lin Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[32]  Sungzoon Cho,et al.  Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.

[33]  Marcus Brown,et al.  User Identification via Keystroke Characteristics of Typed Names using Neural Networks , 1993, Int. J. Man Mach. Stud..

[34]  Yue Pan,et al.  Parameter Discrimination Analysis in Speaker Identification Using Self Organizing Map , 1997, AVBPA.

[35]  Mohammad S. Obaidat,et al.  Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..

[36]  Tom Fawcett,et al.  ROC Graphs: Notes and Practical Considerations for Researchers , 2007 .