Skip to main content

Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11317))

Abstract

Mobile keystroke dynamic biometric authentication requires several biometric samples for enrolment. In some application context or scenario where the user scarcely uses the application, it could take quite a while to get enough samples for enrolment. This creates a window of vulnerability where the user cannot be authenticated using the keystroke dynamic biometric. We propose in this paper, an adaptive approach to derive initially the user profile online and passively with a minimum number of samples, and then progressively update the profile as more samples become available. The approach uses ensemble classification methods and the equal error rate as profile maturity metric. The approach was evaluated using an existing dataset involving 42 users yielding encouraging results. The best performance achieved was an EER of 5.29% using Random forest algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://www.ms.sapientia.ro/~manyi/keystroke.html.

References

  1. Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)

    Article  Google Scholar 

  2. Al-Obaidi, N.M., Al-Jarrah, M.M.: Statistical median-based classifier model for keystroke dynamics on mobile devices. In: 2016 Sixth International Conference on Digital Information Processing and Communications (ICDIPC), pp. 186–191, April 2016

    Google Scholar 

  3. Antal, M., Szabó, L.Z.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science, pp. 343–350, May 2015

    Google Scholar 

  4. Antal, M., Szabó, L.Z., László, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015)

    Article  Google Scholar 

  5. Clarke, N.L., Furnell, S.M.: Authenticating mobile phone users using keystroke analysis. Int. J. Inf. Secur. 6(1), 1–14 (2006)

    Article  Google Scholar 

  6. El-Abed, M., Dafer, M., El Khayat, R.: RHU keystroke: a mobile-based benchmark for keystroke dynamics systems. In: Proceedings of the 48th IEEE International Carnahan Conference on Security Technology (2012)

    Google Scholar 

  7. Jadhav, C., Kulkami, S., Shelar, S., Shinde, K., Dharwadkar, N.V.: Biometrie authentication using keystroke dynamics. In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 870–875, February 2017

    Google Scholar 

  8. Karnan, M., Krishnaraj, N.: Keystroke dynamic approach to secure mobile devices. In: 2010 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–4, December 2010

    Google Scholar 

  9. Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, DSN 2009, pp. 125–134, June 2009

    Google Scholar 

  10. Leggett, J., Williams, G., Usnick, M., Longnecker, M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Mach. Stud. 35(6), 859–870 (1991)

    Article  Google Scholar 

  11. Neal, T.J., Woodard, D.L.: Surveying biometric authentication for mobile device security. J. Pattern Recogn. Res. 1, 74–110 (2016)

    Article  Google Scholar 

  12. Pankanti, S., Ratha, N.K., Bolle, R.M.: Structure in errors: a case study in fingerprint verification. In: Object Recognition Supported by User Interaction for Service Robots (2002)

    Google Scholar 

  13. Woodard, D., Banerjee, S.P.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)

    Article  Google Scholar 

  14. Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. arXiv preprint arXiv:0910.0817 (2009)

  15. Stefan, D., Yao, D.D.: Keystroke-dynamics authentication against synthetic forgeries. In: 2010 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 1–8. IEEE (2010)

    Google Scholar 

Download references

Acknowledgment

This research is supported by the Jazan University and the Ministry of Education of the Kingdom of Saudi Arabia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Faisal Alshanketi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alshanketi, F., Traoré, I., Kanan, A., Awad, A. (2018). Adaptive Mobile Keystroke Dynamic Authentication Using Ensemble Classification Methods. In: Traore, I., Woungang, I., Ahmed, S., Malik, Y. (eds) Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments. ISDDC 2018. Lecture Notes in Computer Science(), vol 11317. Springer, Cham. https://doi.org/10.1007/978-3-030-03712-3_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-03712-3_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-03711-6

  • Online ISBN: 978-3-030-03712-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics