Abstract
Mobile keystroke dynamic biometric authentication requires several biometric samples for enrolment. In some application context or scenario where the user scarcely uses the application, it could take quite a while to get enough samples for enrolment. This creates a window of vulnerability where the user cannot be authenticated using the keystroke dynamic biometric. We propose in this paper, an adaptive approach to derive initially the user profile online and passively with a minimum number of samples, and then progressively update the profile as more samples become available. The approach uses ensemble classification methods and the equal error rate as profile maturity metric. The approach was evaluated using an existing dataset involving 42 users yielding encouraging results. The best performance achieved was an EER of 5.29% using Random forest algorithm.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)
Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186–191, April 2016
Antal, M., Szabó, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 343–350, May 2015
Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)
Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)
El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: Proceedings of the 48th IEEE International Carnahan Conference on Security Technology (2012)
Jadhav, C., Kulkami, S., Shelar, S., Shinde, K., Dharwadkar, N.V.: Biometrie authentication using keystroke dynamics. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 870–875, February 2017
Karnan, M., Krishnaraj, N.: Keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, December 2010
Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 125–134, June 2009
Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud. 35(6), 859–870 (1991)
Neal, T.J., Woodard, D.L.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 1, 74–110 (2016)
Pankanti, S., Ratha, N.K., Bolle, R.M.: Structure in errors: a case study in fingerprint verification. In: Object Recognition Supported by User Interaction for Service Robots (2002)
Woodard, D., Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)
Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)
Stefan, D., Yao, D.D.: Keystroke-dynamics authentication against synthetic forgeries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–8. IEEE (2010)
Acknowledgment
This research is supported by the Jazan University and the Ministry of Education of the Kingdom of Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Alshanketi, F., Traoré, I., Kanan, A., Awad, A. (2018). Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods. In: Traore, I., Woungang, I., Ahmed, S., Malik, Y. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2018. Lecture Notes in Computer Science(), vol 11317. Springer, Cham. https://doi.org/10.1007/978-3-030-03712-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-03712-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-03711-6
Online ISBN: 978-3-030-03712-3
eBook Packages: Computer ScienceComputer Science (R0)