Browse > Article
http://dx.doi.org/10.3837/tiis.2019.08.014

Enhanced Authentication System Performance Based on Keystroke Dynamics using Classification algorithms  

Salem, Asma (Computer Science Department, KASIT, University of Jordan)
Sharieh, Ahmad (Computer Science Department, KASIT, University of Jordan)
Sleit, Azzam (Computer Science Department, KASIT, University of Jordan)
Jabri, Riad (Computer Science Department, KASIT, University of Jordan)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.8, 2019 , pp. 4076-4092 More about this Journal
Abstract
Nowadays, most users access internet through mobile applications. The common way to authenticate users through websites forms is using passwords; while they are efficient procedures, they are subject to guessed or forgotten and many other problems. Additional multi modal authentication procedures are needed to improve the security. Behavioral authentication is a way to authenticate people based on their typing behavior. It is used as a second factor authentication technique beside the passwords that will strength the authentication effectively. Keystroke dynamic rhythm is one of these behavioral authentication methods. Keystroke dynamics relies on a combination of features that are extracted and processed from typing behavior of users on the touched screen and smart mobile users. This Research presents a novel analysis in the keystroke dynamic authentication field using two features categories: timing and no timing combined features. The proposed model achieved lower error rate of false acceptance rate with 0.1%, false rejection rate with 0.8%, and equal error rate with 0.45%. A comparison in the performance measures is also given for multiple datasets collected in purpose to this research.
Keywords
Security; biometric authentication; keystroke dynamics; behavioral authentication;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Zaidan, D., Salem, A., Swidan, A., & Saifan, R, "Factors affecting keystroke dynamics for verification data collecting and analysis," in Proc. of Information Technology (ICIT), 2017 8th International Conference on, pp. 392-398, 2017.
2 Britz, D, "Implementing a Neural Network from Scratch in Python - An Introduction," 2015.
3 Mohammad, R. M., Thabtah, F., & McCluskey, L, "Predicting phishing websites based on self-structuring neural network," Neural Computing and Applications, 25(2), 443-458, 2014.   DOI
4 Jha, V, "Random Forest - Supervised classification machine learning algorithm," 2017.
5 Mrion, N, "17: Bagging," 2018.
6 Jain, R, "Decision Tree Learning. It begins here," 2017.
7 Tanwani, A. K., Afridi, J., Shafiq, M. Z., & Farooq, M, "Guidelines to select machine learning scheme for classification of biomedical datasets," in Proc. of Evolutionary Computation, Machine Learning and Data Mining in Bioinformatics, pp. 128-139, 2009.
8 Popescu, M. C., Balas, V. E., Perescu-Popescu, L., & Mastorakis, N, "Multilayer perceptron and neural networks," WSEAS Transactions on Circuits and Systems, 8(7), 579-588, 2009.
9 Sleit, A., AlMobaideen, W., Baarah, A. H., & Abusitta, A. H, "An efficient pattern matching algorithm," Journal of Applied Sciences, 7(18), 269-2695, 2007   DOI
10 Sleit, A., Saadeh, H., Al-Dhamari, I., & Tareef, A, "An enhanced sub image matching algorithm for binary images," in Proc. of American conference on Applied mathematics, pp. 565-569, 2010.
11 Sleit, A., Al-Akhras, M., Juma, I., & Alian, M, "Applying ordinal association rules for cleansing data with missing values," Journal of American Science, 5(3), 52-62, 2009.
12 Hammo, B., Sleit, A., & El-Haj, M, "Enhancing retrieval effectiveness of diacritisized Arabic passages using stemmer and thesaurus," in Proc. of The 19th Midwest Artificial Intelligence and Cognitive Science Conference (MAICS2008), 2008.
13 Li, Z., Tang, J., & Mei, T, "Deep collaborative embedding for social image understanding," IEEE transactions on pattern analysis and machine intelligence, vol. 41, no. 9, pp. 2070-2083, 2019.   DOI
14 Li, Z., Tang, J., & He, X, "Robust structured nonnegative matrix factorization for image representation," IEEE transactions on neural networks and learning systems, 29(5), 1947-1960, 2018.   DOI
15 Al-Obaidi, N. M., & Al-Jarrah, M. M, "Statistical median-based classifier model for keystroke dynamics on mobile devices," in Proc. of Digital Information Processing and Communications (ICDIPC), 2016 Sixth International Conference on, pp. 186-191, 2016.
16 Alghamdi, S. J., & Elrefaei, L. A, "Dynamic user verification using touch keystroke based on medians vector proximity," in Proc. of Computational Intelligence, Communication Systems and Networks (CICSyN), 2015 7th International Conference on, pp. 121-126, 2015.
17 Tasia, C. J., Chang, T. Y., Cheng, P. C., & Lin, J. H, "Two novel biometric features in keystroke dynamics authentication systems for touch screen devices," Security and Communication Networks, 7(4), 750-758, 2014.   DOI
18 Jain, L., Monaco, J. V., Coakley, M. J., & Tappert, C. C, "Passcode keystroke biometric performance on smartphone touchscreens is superior to that on hardware keyboards," International Journal of Research in Computer Applications & Information Technology, 2(4), 29-33, 2014.
19 Alshanketi, F., Traore, I., & Ahmed, A. A, "Improving Performance and Usability in Mobile Keystroke Dynamic Biometric Authentication," in Proc. of Security and Privacy Workshops (SPW), 2016 IEEE, pp. 66-73, 2016.
20 Draffin, B., Zhu, J., & Zhang, J, "Keysens: passive user authentication through micro-behavior modeling of soft keyboard interaction," in Proc. of Mobile Computing, Applications, and Services, pp. 184-201, 2014.
21 Kambourakis, G., Damopoulos, D., Papamartzivanos, D., & Pavlidakis, E, "Introducing touchstroke: keystroke-based authentication system for smartphones," Security and Communication Networks, 9(6), 542-554, 2016.   DOI
22 Zheng, N., Bai, K., Huang, H., & Wang, H, "You are how you touch: User verification on smartphones via tapping behaviors," in Proc. of Network Protocols (ICNP), 2014 IEEE 22nd International Conference on, pp. 221-232, 2014.
23 Trojahn, M., Arndt, F., & Ortmeier, F, "Authentication with keystroke dynamics on touchscreen keypads-effect of different N-Graph combinations," in Proc. of 3rd International Conference on Mobile Services, Resources, and Users (MOBILITY), pp. 114-119, 2013.
24 Tsai, C. J., Chang, T. Y., Tsai, W. J., Peng, C. C., Chiang, M. L., & Wu, H. S, "Work in progress: A new approach of changeable password for keystroke dynamics authentication system on smart phones," in Proc. of Communications and Networking in China (CHINACOM), 2014 9th International Conference on, pp. 353-356, 2014.
25 D'Lima, N., & Mittal, J, "Password authentication using Keystroke Biometrics," in Proc. of Communication, Information & Computing Technology (ICCICT), 2015 International Conference on, pp. 1-6, 2015.
26 Frank, M., Biedert, R., Ma, E., Martinovic, I., & Song, D, "Touchalytics: On the applicability of touchscreen input as a behavioral biometric for continuous authentication," IEEE transactions on information forensics and security, 8(1), 136-148, 2013.   DOI
27 Salem, A., Zaidan, D., Swidan, A., & Saifan, R, "Analysis of strong password using keystroke dynamics authentication in touch screen devices," in Proc. of Cybersecurity and Cyberforensics Conference (CCC), pp. 15-21, 2016.
28 Bakelman, N., Monaco, J. V., Cha, S. H., & Tappert, C. C, "Keystroke biometric studies on password and numeric keypad input," in Proc. of Intelligence and Security Informatics Conference (EISIC), 2013 European, pp. 204-207, 2013.
29 Coakley, M. J., Monaco, J. V., & Tappert, C. C, "Keystroke biometric studies with short numeric input on smartphones," in Proc. of Biometrics Theory, Applications and Systems (BTAS), 2016 IEEE 8th International Conference on, pp. 1-6, 2016.
30 Ali, M. L., Tappert, C. C., Qiu, M., & Monaco, J. V, "Authentication and identification methods used in keystroke biometric systems," in Proc. of High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on, pp. 1424-1429, 2015.
31 Ali, M. L., Monaco, J. V., Tappert, C. C., & Qiu, M, "Keystroke biometric systems for user authentication," Journal of Signal Processing Systems, 86(2-3), 175-190, 2017.   DOI
32 Killourhy, K. S., & Maxion, R. A, "Comparing anomaly-detection algorithms for keystroke dynamics," in Proc. of Dependable Systems & Networks, 2009. DSN'09. IEEE/IFIP International Conference on, pp. 125-134, 2009.
33 Obaidat, M. S., & Sadoun, B, "Verification of computer users using keystroke dynamics," IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 27(2), 261-269, 1997.   DOI
34 Ramzi, S., Salem, A., Zaidan, D., & Swidan, A, "A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices," ournal of Social Sciences (COES&RJ-JSS), 5(1), 29-41, 2016.   DOI
35 Monaco, V, Datasets, 2018. Retrieved from http://www.vmonaco.com/keystroke-datasets.
36 Zhao, Z., Xu, S., Kang, B. H., Kabir, M. M. J., Liu, Y., & Wasinger, R, "Investigation and improvement of multi-layer perceptron neural networks for credit scoring," Expert Systems with Applications, 42(7), 3508-3516, 2015.   DOI