Browse > Article
http://dx.doi.org/10.7232/JKIIE.2016.42.4.280

User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers  

Seo, Dongmin (Department of Data Science, Seoul National University of Science and Technology)
Kang, Pilsung (School of Industrial Management Engineering, Korea University)
Publication Information
Journal of Korean Institute of Industrial Engineers / v.42, no.4, 2016 , pp. 280-289 More about this Journal
Abstract
User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.
Keywords
Keystroke Dynamics; User Authentication; Free Text; Outlier Detection;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Ahmed, A. A. and Traore, I. (2014), Biometric recognition based on free-text keystroke dynamics, Cybernetics, IEEE Transactions on, 44(4), 458-472.   DOI
2 Alsultan, A. and Warwick, K. (2013), Keystroke dynamics authentication : a survey of free-text methods, International Journal of Computer Science Issues, 10(4), 1-10.
3 Ashbourn, J. (2000), The distinction between authentication and identification, Avanti Biometric Reference Site, http://ntlworld.com/avanti.
4 Bours, P. and Mondal, S. (2015), Continuous Authentication with Keystroke Dynamics, Recent advances in user authentication using keystroke dynamics biometrics, 41-58, Science Gate Publishing, Xanthi, Greece.
5 David, M. J. (2001), One-class classification : Concept-learning in the absence of counter-examples, ASCI dissertation series, 65, Delft University of Technology, CD Delft, Netherlands.
6 Davoudi, H. and Kabir, E. (2009) A new distance measure for free text keystroke authentication, Computer Conference 2009, CSICC 2009, 14th International CSI, IEEE, 570-575.
7 Gunetti, D. and Picardi, C. (2005), Keystroke analysis of free text, ACM Transactions on Information and System Security (TISSEC), 8(3), 312-347.   DOI
8 Hayashi, et al. (2013), Casa : context-aware scalable authentication, Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM.
9 Jain, et al. (2004), An introduction to biometric recognition, Circuits and Systems for Video Technology, IEEE Transactions on, 14(1), 44-20.
10 Jain, et al. (2006), Biometrics: a tool for information security, Information Forensics and Security, IEEE Transactions on, 1(2), 125-143.   DOI
11 Kaganov, et al. (2014), Hybrid method for active authentication using keystroke dynamics, Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, IEEE, 61-66.
12 Kang, P. and Cho, S. (2015), Keystroke dynamics-based user authentication using long and free text strings from various input devices, Information Sciences, 308, 72-93.   DOI
13 Kang, P., Kim, D., Lee, S., Doh, S., and Cho, S. (2012), Estimating the reliability of virtual metrology predictions in semiconductor manufacturing : A novelty detection-based approach, Journal of the Korean Institute of Industrial Engineers, 38(1), 46-56.   DOI
14 Kassim, M. M. and Sujitha, A. (2013), ProcurePass : A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack, Computational and Business Intelligence (ISCBI), 2013 International Symposium on, IEEE, 31-34.
15 Manevitz, L. M. and Yousef, M. (2002), One-class SVMs for document classification, the Journal of machine Learning research, 2, 139-154.
16 Monrose, F. and Rubin, A. D. (2000), Keystroke dynamics as a biometric for authentication, Future Generation computer systems, 16(4), 351-359.   DOI
17 Niinuma, et al. (2010), Soft biometric traits for continuous user authentication, Information Forensics and Security, IEEE Transactions on, 5(4), 771-780.   DOI
18 Roth, et al. (2013), Biometric authentication via keystroke sound, Biometrics (ICB), 2013 International Conference on, IEEE, 1-8.
19 Samura, T. and Nishimura, H. (2012), Influence of Keyboard Difference on Personal Identification by Keystroke Dynamics in Japanese Free Text Typing, Emerging Trends in Engineering and Technology (ICETET), 2012 Fifth International Conference on, IEEE, 30-35.
20 Shimshon, et al. (2010), Continuous verification using keystroke dynamics, Computational Intelligence and Security (CIS), 2010 International Conference on, IEEE, 411-415.