Computer Science ›› 2015, Vol. 42 ›› Issue (11): 203-207.doi: 10.11896/j.issn.1002-137X.2015.11.042

Previous Articles     Next Articles

Method of User Identification Based on Keystroke Behavior and its Application

WANG Yu-jie, ZHAO Pei-hai and WANG Mi-mi   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Most researches on keyboard behavior have been limited in experimental environment,which force user to input a specific string or limite the number of participants,so the result of research can’t apply into real production environment.To overcome this limitation and resolve the problem of the unbalanced samples between positive and negative and the problem of lacking negative samples,ten million keystroke behaviors were analyzed,and a method for user identification was introduced.The duration and the interval of keystroke describing the user’s behavior are used,and the similarity of different keystrokes is measured by Mahalanobis distance.The result of experiment shows that our method gets an accuracy of 80%.

Key words: User identification,Identify verification,Keystroke behavior,Mahalanobis distance,Similarity of vector

[1] Giot R,Hemery B,Rosenberger C.Low cost and usable multimodal biometric system based on keystroke dynamics and 2d face recognition[C]∥Pattern Recognition (ICPR).Istanbul:IEEE Computer Society,2010:1128-1131
[2] Jain A K,Pankanti S,Prabhakar S,et al.Biometrics:a grandchallenge[C]∥Proceedings of the 17th International Conference Pattern Recognition,2004.Cambridge:IEEE Computer Society,2004:935-942
[3] Jain A K,Ross A,Prabhakar S.An introduction to biometricrecognition[J].IEEE Transactions on Circuits and Systems for Video Technology,2004,14(1):4-20
[4] Prabhakar S,Pankanti S,Jain A K.Biometric recognition:Security and privacy concerns[J].IEEE Security & Privacy,2003,1(2):33-42
[5] Uludag U,Pankanti S,Prabhakar S,et al.Biometric cryptosystems:issues and challenges[J].Proceedings of the IEEE,2004,92(6):948-960
[6] Vadivel A,Majumdar A K,Sural S.Performance comparison of distance metrics in content-based image retrieval applications[C]∥International Conference on Information Technology.Bhubaneswar,India:CIT,2003:159-164
[7] Killourhy K S,Maxion R A.Comparing anomaly-detection algorithms for keystroke dynamics[C]∥Dependable Systems & Networks.Lisbon:IEEE IFIP,2009:125-134
[8] Zhong Y,Deng Y,Jain A K.Keystroke dynamics for user authentication[C]∥Computer Vision and Pattern Recognition Workshops (CVPRW).Providence,RI:IEEE Computer Society,2012:117-123
[9] Monrose F,Reiter M K,Wetzel S.Password hardening based on keystroke dynamics[J].International Journal of Information Security,2002,1(2):69-83
[10] Umphress D,Williams G.Identity verification through keyboard characteristics[J].International Journal of Man-machine Stu-dies,1985,23(3):263-273
[11] Messerman A,Mustafic T,C amtepe S A,et al.Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics[C]∥2011 International Joint Conference Biometrics (IJCB).Washington,DC:IEEE Biometrics Council,2011:1-8
[12] Al Solami E,Boyd C,Clark A,et al.Continuous Biometric Authentication:Can It Be More Practical? [C]∥2010 12th IEEE International Conference High Performance Computing and Communications (HPCC).Melbourne,VIC,2010:647-652
[13] Zack R S,Tappert C C,Cha S H.Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method[C]∥2010 Fourth IEEE International Conference,Biometrics:Theory Applications and Systems (BTAS).Washington,DC:IEEE Biome-trics Council,2010:1-6
[14] Sim T,Janakiraman R.Are digraphs good for free-text key-stroke dynamics?[C]∥Computer Vision and Pattern Recognition,2007(CVPR).Minneapolis,MN,2007:1-6
[15] De Ru W G,Eloff J H P.Enhanced password authenticationthrough fuzzy logic[J].IEEE Expert,1997,12(6):38-45
[16] Tey C M,Gupta P,Gao D.I can be You:Questioning the use of Keystroke Dynamics as Biometrics[C]∥The 20th Annual Network & Distributed System Security Symposium(NDSS).San Diego,CA,2013:134-150
[17] Cho S,Han C,Han D H,et al.Web-based keystroke dynamics identity verification using neural network[J].Journal of Organizational Computing and Electronic Commerce,2000,10(4):295-307
[18] Joyce R,Gupta G.Identity authentication based on keystroke latencies[J].Communications of the ACM,1990,33(2):168-176
[19] Kang P,Hwang S,Cho S.Continual retraining of keystroke dynamics based authenticator[M]∥Advances in Biometrics.Seoul,Korea:Springer Berlin Heidelberg,2007:1203-1211
[20] Yu E,Cho S.GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification[C]∥Procee-dings of the International Joint Conference Neural Networks,2003.Portland,OR,2003:2253-2257

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!