CrossBehaAuth: Cross-Scenario Behavioral Biometrics Authentication Using Keystroke Dynamics

Behavioral biometrics has been widely investigated and deployed in real world scenarios for human authentication. However, there has been almost nil attempt to identify behavior patterns in a cross-scenario setting, which is common in practice and needs urgent attention. This paper defines and investigates cross-scenario behavioral biometrics authentication using keystroke dynamics. A novel system called CrossBehaAuth is presented for extending keystroke dynamics-based behavior authentication to new scenarios and extensive problems. We design a temporal-aware learning mechanism based deep neural network for cross-scenario keystroke dynamics authentication. This mechanism selectively learns and encodes temporal information for efficient behavioral pattern transfer in cross-scenario settings. A local Gaussian data augmentation approach is proposed to increase the diversity of behavioral data and therefore, further improve the performance. We evaluate the proposed approach on two publicly available datasets. The extensive experimental results confirm the efficacy of our CrossBehaAuth for cross-scenario keystroke dynamics authentication. Our approach significantly improves the authentication accuracy in cross-scenario settings and even achieves comparable performance on single-scenario authentication tasks. In addition, our approach shows its generalizability and advantages in both single and cross scenario keystroke dynamics authentication.

[1]  Stephen Flowerday,et al.  Passphrase and keystroke dynamics authentication: Usable security , 2020, Comput. Secur..

[2]  Xiaofeng Lu,et al.  Continuous authentication by free-text keystroke based on CNN plus RNN , 2018, IIKI.

[3]  Brendan Dolan-Gavitt,et al.  Automatic Uncovering of Hidden Behaviors From Input Validation in Mobile Apps , 2020, 2020 IEEE Symposium on Security and Privacy (SP).

[4]  John V. Monaco,et al.  TypeNet: Scaling up Keystroke Biometrics , 2020, 2020 IEEE International Joint Conference on Biometrics (IJCB).

[5]  Vir V. Phoha,et al.  Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User Identification , 2020, ACM Trans. Priv. Secur..

[6]  Vir V. Phoha,et al.  DoubleType: Authentication Using Relationship Between Typing Behavior on Multiple Devices , 2020, 2020 International Conference on Artificial Intelligence and Signal Processing (AISP).

[7]  Ivan Martinovic,et al.  28 Blinks Later: Tackling Practical Challenges of Eye Movement Biometrics , 2019, CCS.

[8]  Alberto Botana López,et al.  Deep Learning in Biometrics: A Survey , 2019, ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal.

[9]  Fabio Martinelli,et al.  Keystroke Analysis for User Identification using Deep Neural Networks , 2019, 2019 International Joint Conference on Neural Networks (IJCNN).

[10]  Zheng Wang,et al.  CrossSense: Towards Cross-Site and Large-Scale WiFi Sensing , 2018, MobiCom.

[11]  Tao Li,et al.  EyeTell: Video-Assisted Touchscreen Keystroke Inference from Eye Movements , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[12]  Patrick Bours,et al.  Cross Keyboard Keystroke Dynamics , 2018, 2018 1st International Conference on Computer Applications & Information Security (ICCAIS).

[13]  Philip S. Yu,et al.  Stratified Transfer Learning for Cross-domain Activity Recognition , 2017, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[14]  Shambhu J. Upadhyaya,et al.  Sensitivity analysis in keystroke dynamics using convolutional neural networks , 2017, 2017 IEEE Workshop on Information Forensics and Security (WIFS).

[15]  Kevin Warwick,et al.  Improving the performance of free-text keystroke dynamics authentication by fusion , 2017, Appl. Soft Comput..

[16]  Lukasz Kaiser,et al.  Attention is All you Need , 2017, NIPS.

[17]  Zhi-Li Zhang,et al.  Multi-touch Authentication Using Hand Geometry and Behavioral Information , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[18]  Shambhu J. Upadhyaya,et al.  Continuous Authentication Using Behavioral Biometrics , 2017, IWSPA@CODASPY.

[19]  Shambhu J. Upadhyaya,et al.  Transfer learning in long-text keystroke dynamics , 2017, 2017 IEEE International Conference on Identity, Security and Behavior Analysis (ISBA).

[20]  Yan Lindsay Sun,et al.  Shared keystroke dataset for continuous authentication , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).

[21]  Shambhu J. Upadhyaya,et al.  User authentication with keystroke dynamics in long-text data , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[22]  Shambhu J. Upadhyaya,et al.  Adaptive techniques for intra-user variability in keystroke dynamics , 2016, 2016 IEEE 8th International Conference on Biometrics Theory, Applications and Systems (BTAS).

[23]  John V. Monaco,et al.  The partially observable hidden Markov model and its application to keystroke dynamics , 2016, Pattern Recognit..

[24]  Jugal K. Kalita,et al.  Authentication of Smartphone Users Using Behavioral Biometrics , 2016, IEEE Communications Surveys & Tutorials.

[25]  Shambhu J. Upadhyaya,et al.  Enhanced recognition of keystroke dynamics using Gaussian mixture models , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[26]  Stephanie Schuckers,et al.  Effect of data size on performance of free-text keystroke authentication , 2015, IEEE International Conference on Identity, Security and Behavior Analysis (ISBA 2015).

[27]  Yoshua Bengio,et al.  Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.

[28]  Issa Traoré,et al.  Biometric Recognition Based on Free-Text Keystroke Dynamics , 2014, IEEE Transactions on Cybernetics.

[29]  Sahin Albayrak,et al.  Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[30]  Yiqiang Chen,et al.  Cross-People Mobile-Phone Based Activity Recognition , 2011, IJCAI.

[31]  Sung-Hyuk Cha,et al.  Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[32]  Andrew Beng Jin Teoh,et al.  Statistical Fusion Approach on Keystroke Dynamics , 2007, 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based System.

[33]  Xuelong Li,et al.  General Tensor Discriminant Analysis and Gabor Features for Gait Recognition , 2007, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[34]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[35]  Sharath Pankanti,et al.  Biometrics: a tool for information security , 2006, IEEE Transactions on Information Forensics and Security.

[36]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[37]  Wendy Chen,et al.  Applying hidden Markov models to keystroke pattern analysis for password verification , 2004, Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004. IRI 2004..

[38]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[39]  S. Hochreiter,et al.  Long Short-Term Memory , 1997, Neural Computation.

[40]  Yoshua Bengio,et al.  Learning long-term dependencies with gradient descent is difficult , 1994, IEEE Trans. Neural Networks.

[41]  Yann LeCun,et al.  Signature Verification Using A "Siamese" Time Delay Neural Network , 1993, Int. J. Pattern Recognit. Artif. Intell..

[42]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[43]  Young D. Kwon,et al.  ContAuth: Continual Learning Framework for Behavioral-based User Authentication , 2020, Proc. ACM Interact. Mob. Wearable Ubiquitous Technol..

[44]  Mahbub Hassan,et al.  KEH-Gait: Towards a Mobile Healthcare User Authentication System by Kinetic Energy Harvesting , 2017, NDSS.

[45]  Vikram Pudi,et al.  Deep Secure : A Fast and Simple Neural Network based approach for User Authentication and Identification via Keystroke Dynamics , 2017 .

[46]  Khalid Saeed,et al.  Application of Recurrent Neural Networks for User Verification based on Keystroke Dynamics , 2016 .

[47]  Andrew Zisserman,et al.  Deep Face Recognition , 2015, BMVC.

[48]  Yu Zhong,et al.  Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network , 2015 .