Verification of computer users using keystroke dynamics

This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login string as characteristic patterns using pattern recognition and neural network techniques. This work is a continuation of our previous work where only interkey times were used as features for identifying computer users. In this work we used the key hold times for classification and then compared the performance with the former interkey time-based technique. Then we use the combined interkey and hold times for the identification process. We applied several neural network and pattern recognition algorithms for verifying computer users as they type their password phrases. It was found that hold times are more effective than interkey times and the best identification performance was achieved by using both time measurements. An identification accuracy of 100% was achieved when the combined hold and intekey time-based approach were considered as features using the fuzzy ARTMAP, radial basis function networks (RBFN), and learning vector quantization (LVQ) neural network paradigms. Other neural network and classical pattern algorithms such as backpropagation with a sigmoid transfer function (BP, Sigm), hybrid sum-of-products (HSOP), sum-of-products (SOP), potential function and Bayes' rule algorithms gave moderate performance.

[1]  Stephen Grossberg,et al.  Art 2: Self-Organization Of Stable Category Recognition Codes For Analog Input Patterns , 1988, Other Conferences.

[2]  Teuvo Kohonen,et al.  Improved versions of learning vector quantization , 1990, 1990 IJCNN International Joint Conference on Neural Networks.

[3]  Noble Harter,et al.  Studies in the physiology and psychology of the telegraphic language , 1897 .

[4]  Julius T. Tou,et al.  Pattern Recognition Principles , 1974 .

[5]  John J. Leggett,et al.  Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..

[6]  Mohammad S. Obaidat,et al.  An online neural network system for computer access security , 1993, IEEE Trans. Ind. Electron..

[7]  Mohammad S. Obaidat,et al.  A Multilayer Neural Network System for Computer Access Security , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[8]  Morton Nadler,et al.  Pattern recognition engineering , 1993 .

[9]  Stephen Grossberg,et al.  Fuzzy ARTMAP: an adaptive resonance architecture for incremental learning of analog maps , 1992, [Proceedings 1992] IJCNN International Joint Conference on Neural Networks.

[10]  Mohammad S. Obaidat,et al.  Dimensionality reduction and feature extraction applications in identifying computer users , 1991, IEEE Trans. Syst. Man Cybern..

[11]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[12]  J. A. Leonard,et al.  Radial basis function networks for classifying process faults , 1991, IEEE Control Systems.

[13]  Roger J.-B. Wets,et al.  Minimization by Random Search Techniques , 1981, Math. Oper. Res..

[14]  Mohammad S. Obaidat A methodology for improving computer access security , 1993, Comput. Secur..

[15]  Shun-ichi Amari,et al.  Mathematical foundations of neurocomputing , 1990, Proc. IEEE.

[16]  Stephen Grossberg,et al.  The ART of adaptive pattern recognition by a self-organizing neural network , 1988, Computer.

[17]  Robert A. Jacobs,et al.  Increased rates of convergence through learning rate adaptation , 1987, Neural Networks.

[18]  Jacek M. Zurada,et al.  Introduction to artificial neural systems , 1992 .

[19]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[20]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[21]  J. Tou Engineering Principles of Pattern Recognition , 1969 .

[22]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[23]  Mohammad S. Obaidat,et al.  Methodologies for characterizing ultrasonic transducers using neural network and pattern recognition techniques , 1992, IEEE Trans. Ind. Electron..

[24]  John Moody,et al.  Fast Learning in Networks of Locally-Tuned Processing Units , 1989, Neural Computation.

[25]  Norio Baba,et al.  A new approach for finding the global minimum of error function of neural networks , 1989, Neural Networks.

[26]  M.H. Hassoun,et al.  Fundamentals of Artificial Neural Networks , 1996, Proceedings of the IEEE.

[27]  Mohammad S. Obaidat On the characterization of ultrasonic transducers using pattern recognition , 1993, IEEE Trans. Syst. Man Cybern..