Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics

In this paper, we propose a novel method, based on keystroke dynamics, to distinguish between fake and truthful personal information written via a computer keyboard. Our method does not need any prior knowledge about the user who is providing data. To our knowledge, this is the first work that associates the typing human behavior with the production of lies regarding personal information. Via experimental analysis involving 190 subjects, we assess that this method is able to distinguish between truth and lies on specific types of autobiographical information, with an accuracy higher than 75%. Specifically, for information usually required in online registration forms (e.g., name, surname and email), the typing behavior diverged significantly between truthful or untruthful answers. According to our results, keystroke analysis could have a great potential in detecting the veracity of self-declared information, and it could be applied to a large number of practical scenarios requiring users to input personal data remotely via keyboard.

[1]  Mauro Conti,et al.  On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks , 2016, CODASPY.

[2]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[3]  J. de Houwer,et al.  Implicit measures: A normative analysis and review. , 2009, Psychological bulletin.

[4]  Regan L. Mandryk,et al.  Identifying emotional states using keystroke dynamics , 2011, CHI.

[5]  Luciano Gamberini,et al.  Identity Verification Using a Kinematic Memory Detection Technique , 2017 .

[6]  Bruno Verschuere,et al.  Memory detection: theory and application of the concealed information test , 2011 .

[7]  Claire Cardie,et al.  Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.

[8]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[9]  Umberto Castiello,et al.  How to Accurately Detect Autobiographical Events , 2008, Psychological science.

[10]  Luciano Gamberini,et al.  The detection of faked identity using unexpected questions and mouse dynamics , 2017, PloS one.

[11]  Hassan Takabi,et al.  Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.

[12]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[13]  Y. Anzai,et al.  Pattern Recognition & Machine Learning , 2016 .

[14]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[15]  Mauro Conti,et al.  FakeBook: Detecting Fake Profiles in On-Line Social Networks , 2012, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.

[16]  Mauro Conti,et al.  Biometric Authentication Methods on Smartphones: A Survey , 2016, PsychNology J..

[17]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[18]  Yejin Choi,et al.  Keystroke Patterns as Prosody in Digital Writings: A Case Study with Deceptive Reviews and Essays , 2014, EMNLP.

[19]  Jay F. Nunamaker,et al.  Detecting Deceptive Chat-Based Communication Using Typing Behavior and Message Cues , 2013, TMIS.

[20]  P. Chandler,et al.  Cognitive Load Theory and the Format of Instruction , 1991 .

[21]  Leo Breiman,et al.  Random Forests , 2001, Machine Learning.

[22]  Giuseppe Sartori,et al.  Detecting deception through kinematic analysis of hand movement , 2016 .

[23]  Carlo Strapparava,et al.  The Lie Detector: Explorations in the Automatic Recognition of Deceptive Language , 2009, ACL.

[24]  L. Zhou An empirical investigation of deception behavior in instant messaging , 2005, IEEE Transactions on Professional Communication.

[25]  Sebastian Möller,et al.  Identity theft, computers and behavioral biometrics , 2009, 2009 IEEE International Conference on Intelligence and Security Informatics.

[26]  D. Schacter,et al.  Implicit memory: a selective review. , 1993, Annual review of neuroscience.

[27]  Andrew Sears,et al.  Automated stress detection using keystroke and linguistic features: An exploratory study , 2009, Int. J. Hum. Comput. Stud..

[28]  Jeffrey J. Walczyk,et al.  Advancing Lie Detection by Inducing Cognitive Load on Liars: A Review of Relevant Theories and Techniques Guided by Lessons from Polygraph-Based Approaches , 2013, Front. Psychology.

[29]  Luciano Gamberini,et al.  How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity , 2016, Symbiotic.

[30]  Christopher M. Bishop,et al.  Pattern Recognition and Machine Learning (Information Science and Statistics) , 2006 .

[31]  Khalid Saeed,et al.  A Keystroke Dynamics Based System for User Identification , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[32]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.