Keystroke Data Classification for Computer User Profiling and Verification

The article addresses the issues of behavioral biometrics. Presented research concerns an analysis of a user activity related to a keyboard use in a computer system. A method of computer user profiling based on encrypted keystrokes is introduced to ensure a high level of users data protection. User’s continuous work in a computer system is analyzed. This type of analysis constitutes a type of free-text analysis. Additionally, an attempt to user verification in order to detect intruders is performed. Intrusion detection is based on a modified k-NN classifier and different distance measures.

[1]  Jiankun Hu,et al.  A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics , 2008, 2008 IEEE International Conference on Communications.

[2]  Jamal Raiyn,et al.  A survey of Cyber Attack Detection Strategies , 2014 .

[3]  Jugurta R. Montalvão Filho,et al.  On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..

[4]  Przemyslaw Kudlacik,et al.  Computer User Verification Based on Mouse Activity Analysis , 2015, New Trends in Intelligent Information and Database Systems.

[5]  Rafal Doroz,et al.  The k-NN classifier and self-adaptive Hotelling data reduction technique in handwritten signatures recognition , 2014, Pattern Analysis and Applications.

[6]  Robert Koprowski,et al.  Machine learning, medical diagnosis, and biomedical engineering research - commentary , 2014, BioMedical Engineering OnLine.

[7]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[8]  Anil K. Jain,et al.  Keystroke dynamics for user authentication , 2012, 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[9]  Malek Ben Salem,et al.  A Survey of Insider Attack Detection Research , 2008, Insider Attack and Cyber Security.

[10]  Przemyslaw Kudlacik,et al.  Fuzzy approach for intrusion detection based on user’s commands , 2016, Soft Comput..

[11]  Rafal Doroz,et al.  On-Line Signature Recognition Based on an Analysis of Dynamic Feature , 2013, 2013 International Conference on Biometrics and Kansei Engineering.

[12]  Bartosz Krawczyk,et al.  Clustering-based ensembles for one-class classification , 2014, Inf. Sci..

[13]  Przemyslaw Kudlacik,et al.  A new approach to signature recognition using the fuzzy method , 2014, Pattern Analysis and Applications.

[14]  Giancarlo Ruffo,et al.  Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.

[15]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[16]  M. van Zaanen,et al.  Vibration Sensitive Keystroke Analysis , 2009 .

[17]  Sung-Hyuk Cha,et al.  Keystroke Biometric Identification and Authentication on Long-Text Input , 2010 .

[18]  Kevin Warwick,et al.  Keystroke Dynamics Authentication: A Survey of Free-text Methods , 2013 .

[19]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[20]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2005 .