Emphasizing typing signature in keystroke dynamics using immune algorithms

Graphical abstractDisplay Omitted HighlightsThe paper focuses on keystroke dynamics in a one-class scenario.We show that proper data understanding and preprocessing can be crucial in this scenario.Samples from the same user present similarities in what we call typing signature.Rank transformation can take advantage of it to improve classification performance.This transformation was decisive for the performance of some immune algorithms. Improved authentication mechanisms are needed to cope with the increased data exposure we face nowadays. Keystroke dynamics is a cost-effective alternative, which usually only requires a standard keyboard to acquire authentication data. Here, we focus on recognizing users by keystroke dynamics using immune algorithms, considering a one-class classification approach. In such a scenario, only samples from the legitimate user are available to generate the model of the user. Throughout the paper, we emphasize the importance of proper data understanding and pre-processing. We show that keystroke samples from the same user present similarities in what we call typing signature. A proposal to take advantage of this finding is discussed: the use of rank transformation. This transformation improved performance of classification algorithms tested here and it was decisive for some immune algorithms studied in our setting.

[1]  Francisco Herrera,et al.  A study on the use of non-parametric tests for analyzing the evolutionary algorithms’ behaviour: a case study on the CEC’2005 Special Session on Real Parameter Optimization , 2009, J. Heuristics.

[2]  Roy A. Maxion,et al.  Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.

[3]  Sungzoon Cho,et al.  Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.

[4]  Zyad Shaaban,et al.  Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix , 2006, 2006 International Conference on Dependability of Computer Systems.

[5]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[6]  Christophe Rosenberger,et al.  Can Chronological Information be Used as a Soft Biometric in Keystroke Dynamics? , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[7]  Roy A. Maxion,et al.  The Effect of Clock Resolution on Keystroke Dynamics , 2008, RAID.

[8]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[9]  Woojin Chang Reliable Keystroke Biometric System Based on a Small Number of Keystroke Samples , 2006, ETRICS.

[10]  Baptiste Hemery,et al.  Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..

[11]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[12]  Cheng-Jung Tsai,et al.  A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices , 2012, J. Syst. Softw..

[13]  Janez Demsar,et al.  Statistical Comparisons of Classifiers over Multiple Data Sets , 2006, J. Mach. Learn. Res..

[14]  Wolfgang Banzhaf,et al.  The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..

[15]  Zhou Ji,et al.  Revisiting Negative Selection Algorithms , 2007, Evolutionary Computation.

[16]  C. Bandt Ordinal time series analysis , 2005 .

[17]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[18]  Frank Klawonn,et al.  Guide to Intelligent Data Analysis - How to Intelligently Make Sense of Real Data , 2010, Texts in Computer Science.

[19]  Zhou Ji,et al.  Real-Valued Negative Selection Algorithm with Variable-Sized Detectors , 2004, GECCO.

[20]  Zhou Ji,et al.  V-detector: An efficient negative selection algorithm with "probably adequate" detector coverage , 2009, Inf. Sci..

[21]  Claudia Eckert,et al.  Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.

[22]  Jonathan Timmis,et al.  Artificial immune systems - a new computational intelligence paradigm , 2002 .

[23]  Ana Carolina Lorena,et al.  A systematic review on keystroke dynamics , 2013, Journal of the Brazilian Computer Society.

[24]  Marc Ebner,et al.  On The Use Of Negative Selection In An Artificial Immune System , 2002, GECCO.

[25]  Bernhard Schölkopf,et al.  Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.

[26]  Ana Carolina Lorena,et al.  Negative Selection with High-Dimensional Support for Keystroke Dynamics , 2012, 2012 Brazilian Symposium on Neural Networks.

[27]  Kenneth Revett User Authentication via Keystroke Dynamics: An Artificial Immune System Based Approach , 2011 .

[28]  Jonathan Timmis,et al.  Artificial Immune Systems: A New Computational Intelligence Approach , 2003 .

[29]  Christophe Rosenberger,et al.  Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[30]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[31]  Ana Carolina Lorena,et al.  Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach , 2012, Int. J. Nat. Comput. Res..

[32]  M. Akila,et al.  Biometric personal authentication using keystroke dynamics: A review , 2011, Appl. Soft Comput..

[33]  Bojan Cukic,et al.  Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.

[34]  Claudia Eckert,et al.  A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques , 2005, ICARIS.

[35]  E.O. Freire,et al.  Equalization of keystroke timing histograms for improved identification performance , 2006, 2006 International Telecommunications Symposium.

[36]  Jugurta R. Montalvão Filho,et al.  On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..

[37]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[38]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.