Double serial adaptation mechanism for keystroke dynamics authentication based on a single password

Abstract Cyber-attacks have spread all over the world to steal information such as trade secrets, intellectual property and banking data. Facing the danger of the insecurity of saved data (personal, professional, official, etc.), keystroke dynamics was proposed as an interesting, non-intrusive, inexpensive, permanent and weakly constrained solution for users. Based on the typing rhythm of users, it improves logical access security. Nevertheless, it was demonstrated that such an authentication mechanism would need a larger number of samples to enroll the typing characteristics of users. Moreover, these registered characteristics generally undergo aging effects after a time span. Different solutions have been suggested to remedy these variability problems, including template adaptation. In this paper, we propose a double serial adaptation strategy that considers a single-capture-based enrollment process. When using the authentication system, the template of users and the decision/adaptation thresholds are updated. Experimental results on three public keystroke dynamics datasets show the benefits of the proposed method.

[1]  Sungzoon Cho,et al.  Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..

[2]  Baptiste Hemery,et al.  Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..

[3]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[4]  Christophe Rosenberger,et al.  Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords , 2014, Comput. Secur..

[5]  Jean-Yves Ramel,et al.  Estimation of User Specific Parameters in One-class Problems , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[6]  Christophe Rosenberger,et al.  User Dependent Template Update for Keystroke Dynamics Recognition , 2018, 2018 International Conference on Cyberworlds (CW).

[7]  Alice F. Healy,et al.  A cognitive modeling account of simultaneous learning and fatigue effects , 2011, Cognitive Systems Research.

[8]  Andrzej Drygajlo,et al.  Q-stack aging model for face verification , 2009, 2009 17th European Signal Processing Conference.

[9]  Vir V. Phoha,et al.  Scan-Based Evaluation of Continuous Keystroke Authentication Systems , 2013, IT Professional.

[10]  Jean-Yves Ramel,et al.  User Classification for Keystroke Dynamics Authentication , 2007, ICB.

[11]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[12]  Patrick Bours,et al.  How to comprehensively describe a biometric update mechanisms for keystroke dynamics , 2011, 2011 Third International Workshop on Security and Communication Networks (IWSCN).

[13]  Arun Ross,et al.  Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..

[14]  Sahin Albayrak,et al.  Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[15]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[16]  Roy A. Maxion,et al.  Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.

[17]  Shambhu J. Upadhyaya,et al.  Sensitivity analysis in keystroke dynamics using convolutional neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[18]  Khalid Saeed,et al.  Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics , 2016 .

[19]  Md. Kamrul Hasan,et al.  Identifying emotion by keystroke dynamics and text pattern analysis , 2014, Behav. Inf. Technol..

[20]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[21]  Shambhu J. Upadhyaya,et al.  Transfer learning in long-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[22]  Gian Luca Marcialis,et al.  Self adaptive systems: An experimental analysis of the performance over time , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[23]  Baptiste Hemery,et al.  Low Cost and Usable Multimodal Biometric System Based on Keystroke Dynamics and 2D Face Recognition , 2010, 2010 20th International Conference on Pattern Recognition.

[24]  Christophe Rosenberger,et al.  Adaptive Biometric Strategy using Doddington Zoo Classification of User’s Keystroke Dynamics , 2018, 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC).

[25]  Paulo Pinto,et al.  Free Typed Text Using Keystroke Dynamics for Continuous Authentication , 2014, Communications and Multimedia Security.

[26]  Kenneth Revett,et al.  Enhancing Login Security Through the Use of Keystroke Input Dynamics , 2006, ICB.

[27]  Christophe Rosenberger,et al.  Towards a Secured Authentication Based on an Online Double Serial Adaptive Mechanism of Users' Keystroke Dynamics , 2018 .

[28]  N.M. White,et al.  Use of a Novel Keypad Biometric for Enhanced User Identity Verification , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.

[29]  Pingzhi Fan,et al.  Novel Impostors Detection in Keystroke Dynamics by Support Vector Machine , 2004, PDCAT.

[30]  Patrick Bours,et al.  Cross Keyboard Keystroke Dynamics , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).

[31]  Issa Traoré,et al.  Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.

[32]  Loris Nanni,et al.  A clustering method for automatic biometric template selection , 2006, Pattern Recognit..

[33]  Christophe Rosenberger,et al.  Keystroke template update with adapted thresholds , 2016, 2016 2nd International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).

[34]  Anil K. Jain,et al.  Template Adaptation based Fingerprint Verification , 2006, 18th International Conference on Pattern Recognition (ICPR'06).

[35]  Gian Luca Marcialis,et al.  Template Update Methods in Adaptive Biometric Systems: A Critical Review , 2009, ICB.

[36]  James S. Okolica,et al.  User identification and authentication using multi-modal behavioral biometrics , 2014 .

[37]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[38]  Regan L. Mandryk,et al.  Identifying emotional states using keystroke dynamics , 2011, CHI.

[39]  Masahito Kurihara,et al.  Sensing Pressure for Authentication System Using Keystroke Dynamics , 2004, International Conference on Computational Intelligence.

[40]  Shambhu J. Upadhyaya,et al.  Adaptive techniques for intra-user variability in keystroke dynamics , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[41]  Kalyanmoy Deb,et al.  An introduction to genetic algorithms , 1999 .

[42]  Fabio Roli,et al.  Critical analysis of adaptive biometric systems , 2012, IET Biom..

[43]  Yan Lindsay Sun,et al.  Anatomy of secondary features in keystroke dynamics - achieving more with less , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[44]  Andrea Lagorio,et al.  Facial Template Synthesis based on SIFT Features , 2007, 2007 IEEE Workshop on Automatic Identification Advanced Technologies.

[45]  Josef Kittler,et al.  Model and Score Adaptation for Biometric Systems: Coping With Device Interoperability and Changing Acquisition Conditions , 2010, 2010 20th International Conference on Pattern Recognition.

[46]  Jiankun Hu,et al.  Correlation Keystroke Verification Scheme for User Access Control in Cloud Computing Environment , 2011, Comput. J..

[47]  André Carlos Ponce de Leon Ferreira de Carvalho,et al.  Adaptive approaches for keystroke dynamics , 2015, 2015 International Joint Conference on Neural Networks (IJCNN).

[48]  Christophe Rosenberger,et al.  Hybrid template update system for unimodal biometric systems , 2012, 2012 IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[49]  E.O. Freire,et al.  Multimodal biometric fusion — joint typist (keystroke) and speaker verification , 2006, 2006 International Telecommunications Symposium.

[50]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[51]  André Carlos Ponce de Leon Ferreira de Carvalho,et al.  Enhanced template update: Application to keystroke dynamics , 2016, Comput. Secur..

[52]  Gian Luca Marcialis,et al.  Template Selection by Editing Algorithms: A Case Study in Face Recognition , 2008, SSPR/SPR.

[53]  Christophe Rosenberger,et al.  Web-Based Benchmark for Keystroke Dynamics Biometric Systems: A Statistical Analysis , 2012, 2012 Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[54]  Sungzoon Cho,et al.  Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.

[55]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2005 .