Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification

Research in Keystroke-Dynamics (KD) has customarily focused on temporal features without considering context to generate user templates that are used in authentication. Additionally, work on KD in hand-held devices such as smart-phones and tablets have shown that these features alone do not perform satisfactorily for authentication. In this work, we analyze the discriminatory power of the most-used conventional features found in the literature, propose a set of context-sensitive or word-specific features, and analyze the discriminatory power of proposed features using their classification results. To perform these tasks, we use the keystroke data consisting of over 650K keystrokes, collected from 20 unique users during different activities on desktops, tablets, and phones, over a span of two months. On an average, each user made 12.5K, 9K, and 10K keystrokes on desktop, tablet, and phone, respectively. We find that the conventional features are not highly discriminatory on desktops and are only marginally better on hand-held devices for user identification. By using information of the context, a subset (derived after analysis) of our proposed word-specific features offers superior discrimination among users on all devices. We find that a majority of the classifiers, built using these features, perform user identification well with accuracies in the range of 90% to 97%, average precision and recall values of 0.914 and 0.901, respectively, on balanced test samples in 10-fold cross validation. We also find that proposed features work best on hand-held devices. This work calls for a shift from using conventional KD features to a set of context-sensitive or word-specific KD features that take advantage of known information such as context.

[1]  Dae-Ki Kang,et al.  Mini-batch bagging and attribute ranking for accurate user authentication in keystroke dynamics , 2017, Pattern Recognit..

[2]  Yao Liu,et al.  No Training Hurdles: Fast Training-Agnostic Attacks to Infer Your Typing , 2018, CCS.

[3]  Minglu Li,et al.  KeyLiSterber: Inferring Keystrokes on QWERTY Keyboard of Touch Screen through Acoustic Signals , 2019, IEEE INFOCOM 2019 - IEEE Conference on Computer Communications.

[4]  Alexey E. Sulavko,et al.  Users' identification through keystroke dynamics based on vibration parameters and keyboard pressure , 2017, 2017 Dynamics of Systems, Mechanisms and Machines (Dynamics).

[5]  John Zulueta,et al.  481. Predicting Mood Disturbance Severity in Bipolar Subjects with Mobile Phone Keystroke Dynamics and Metadata , 2017, Biological Psychiatry.

[6]  E. Kabir,et al.  A new distance measure for free text keystroke authentication , 2009, 2009 14th International CSI Computer Conference.

[7]  M. Grgic,et al.  A survey of biometric recognition methods , 2004, Proceedings. Elmar-2004. 46th International Symposium on Electronics in Marine.

[8]  Wahyudi,et al.  Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.

[9]  Vir V. Phoha,et al.  Snoop-Forge-Replay Attacks on Continuous Verification With Keystrokes , 2013, IEEE Transactions on Information Forensics and Security.

[10]  Stephanie Schuckers,et al.  Effects of text filtering on authentication performance of keystroke biometrics , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[11]  Meikang Qiu,et al.  Keystroke Biometric Systems for User Authentication , 2017, J. Signal Process. Syst..

[12]  Deian Stefan,et al.  Keystroke-dynamics authentication against synthetic forgeries , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[13]  Vir V. Phoha,et al.  Stealing Passwords by Observing Hands Movement , 2019, IEEE Transactions on Information Forensics and Security.

[14]  Juan E. Tapiador,et al.  A Survey of Wearable Biometric Recognition Systems , 2016, ACM Comput. Surv..

[15]  Yan Lindsay Sun,et al.  Anatomy of secondary features in keystroke dynamics - achieving more with less , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[16]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[17]  Wei Wang,et al.  Keystroke Recognition Using WiFi Signals , 2015, MobiCom.

[18]  Avar Pentel Predicting User Age by Keystroke Dynamics , 2018, CSOS.

[19]  Jonathan Voris,et al.  Touchscreen Biometrics Across Multiple Devices , 2017, SOUPS.

[20]  Giancarlo Ruffo,et al.  Dealing with Different Languages and Old Profiles in Keystroke Analysis of Free Text , 2005, AI*IA.

[21]  Igor Bilogrevic,et al.  Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches , 2017, IEEE Transactions on Mobile Computing.

[22]  David Guy Brizan,et al.  Utilizing overt and latent linguistic structure to improve keystroke-based authentication , 2017, Image Vis. Comput..

[23]  George D. C. Cavalcanti,et al.  An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting , 2007, 2007 IEEE Congress on Evolutionary Computation.

[24]  Ana Carolina Lorena,et al.  A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.

[25]  Mauro Conti,et al.  Covert lie detection using keyboard dynamics , 2018, Scientific Reports.

[26]  Yong Sheng,et al.  A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[27]  Xiangyang Li,et al.  ViViSnoop: Someone is snooping your typing without seeing it! , 2017, 2017 IEEE Conference on Communications and Network Security (CNS).

[28]  Yunhao Liu,et al.  Context-free Attacks Using Keyboard Acoustic Emanations , 2014, CCS.

[29]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[30]  Jie Yang,et al.  Snooping Keystrokes with mm-level Audio Ranging on a Single Phone , 2015, MobiCom.

[31]  Nitesh V. Chawla,et al.  SMOTE: Synthetic Minority Over-sampling Technique , 2002, J. Artif. Intell. Res..

[32]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[33]  Daniel Vogel,et al.  Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication , 2018, MobiSys.

[34]  Terence Sim,et al.  Are Digraphs Good for Free-Text Keystroke Dynamics? , 2007, 2007 IEEE Conference on Computer Vision and Pattern Recognition.

[35]  Gary M. Weiss,et al.  Smartwatch-based transcription biometrics , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[36]  Orcan Alpar,et al.  Frequency spectrograms for biometric keystroke authentication using neural network based classifier , 2017, Knowl. Based Syst..

[37]  Asok Ray,et al.  On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..

[38]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[39]  Terence Sim,et al.  Keystroke Dynamics in a General Setting , 2007, ICB.

[40]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[41]  Kenneth Revett,et al.  Enhancing Login Security Through the Use of Keystroke Input Dynamics , 2006, ICB.

[42]  Weng Kin Lai,et al.  User identification of numerical keypad typing patterns with subtractive clustering fuzzy inference , 2017, 2017 IEEE 15th Student Conference on Research and Development (SCOReD).

[43]  Soumik Mondal,et al.  A study on continuous authentication using a combination of keystroke and mouse biometrics , 2017, Neurocomputing.

[44]  Stephanie Schuckers,et al.  A practical evaluation of free-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[45]  Kevin Warwick,et al.  Non-conventional keystroke dynamics for user authentication , 2017, Pattern Recognit. Lett..

[46]  Vir V. Phoha,et al.  Examining a Large Keystroke Biometrics Dataset for Statistical-Attack Openings , 2013, TSEC.

[47]  Issa Traoré,et al.  Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.

[48]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[49]  Zhong Lin Wang,et al.  Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array , 2018 .

[50]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[51]  Alexandros Karakos,et al.  Keystroke dynamics features for gender recognition , 2018, Digit. Investig..

[52]  Vir V. Phoha,et al.  Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics , 2015, Int. J. Hum. Comput. Stud..

[53]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[54]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[55]  Rytis Maskeliunas,et al.  Recognition of human daytime fatigue using keystroke data , 2018, ANT/SEIT.

[56]  Soumik Mondal,et al.  Person Identification by Keystroke Dynamics Using Pairwise User Coupling , 2017, IEEE Transactions on Information Forensics and Security.

[57]  Tao Li,et al.  EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements , 2018, 2018 IEEE Symposium on Security and Privacy (SP).