Abstract
Keystroke dynamics is a widely accepted user recognition and verification behavioral biometric, which has been studied nearly for a century. Intrinsically, this biometric is used together with id/password authentication forming multi-factor authentication. There are several anomaly detection algorithms that have been proposed for this task. While some proposals handle this problem with measuring data distance by taking correlation and dependence into account, some models use complex and time-consuming models deep neural networks to train to reach the right approximation. Our paper addresses a simple, accurate and lightweight method for user authentication. We show the effectiveness of our approach through comparisons with existing methods, which have also used the CMU keystroke dynamics benchmark dataset used here too. Using feed forward multilayer neural network with resilient backpropagation, we obtained an Equal Error Rate (ERR) equal to 0.049 for authentication with overall identification accuracy of 94.7%.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, H.-J.: Biometrics, is it a viable proposition for identity authentication and access control? Comput. Secur. 14, 205–214 (1995)
Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Gate to Computer Science and Research Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 1–22 (2015)
Dealey, W., Dvorak, A., Merrick, N., Ford, G.: Typewriting behavior (1936)
Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Man Mach. Stud. 28, 67–76 (1988)
Goicoechea-Telleria, I., Sanchez-Reillo, R., Liu-Jimenez, J., Blanco-Gonzalo, R.: Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? Wirel. Commun. Mob. Comput. 2018, 1–16 (2018)
Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems. ACM Comput. Surv. 50, 1–37 (2017)
Garofalo, G., Rimmer, V., Hamme, T., Preuveneers, D., Joosen, W.: Fishy faces: crafting adversarial images to poison face authentication (2018)
Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19, 1928 (2019)
Zhou, Z., Tang, D., Wang, X., Han, W., Xiangyu, L., Zhang, K.: Invisible mask: practical attacks on face recognition with infrared (2018)
Meng, T.C., Gupta, P., Gao, D.: I can be you: questioning the use of keystroke dynamics as biometrics. In: Proceedings of the 20th Network and Distributed System Security Symposium (2013)
Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI (2011)
Forsen, G., Nelson, M., Staron Jr, R.: Personal attributes authentication techniques. Technical report RADC-TR-77-333, Rome Air Development Center (1977)
Spillane, R.: Keyboard apparatus for personal identification. IBM Tech. Disclosure Bull. 17(3346), 3346 (1975)
Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report Rand Rep. R-2560-NSF, RAND Corporation (1980)
Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351–359 (2000)
Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. Issues 10, 1–10 (2013)
Banerjee, S.P., Woodard, D.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)
Bhatt, S., Santhanam, T.: Keystroke dynamics for biometric authentication—a survey. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)
Crawford, H.: Keystroke dynamics: characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust (2010)
Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11, 1565–1573 (2011)
Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. Int. J. Comput. Sci. Inform. Secur. 5, 115–119 (2009)
Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 1–24 (2013)
Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (2012)
Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217–1222 (1990)
Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (2009)
Yu, E., Cho, S.: GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the International Joint Conference on Neural Networks (2003)
Souza, B., Brito, N., Neves, W., Silva, K., Lima, R., Silva, S.D.: Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines. In: 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541) (2004)
Prasad, N., Singh, R., Lal, S.P.: Comparison of back propagation and resilient propagation algorithm for spam classification. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013)
Swets, J.A., Pickett, R.M.: Evaluation of Diagnostic Systems: Methods from Signal Detection Theory. Academic Press, New York (1982)
Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27, 861–874 (2006)
Deng, Y., Zhong, Y.: Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets. ISRN Signal Process. 2013, 1–7 (2013)
Al-Jarrah, M.: An anomaly detector for keystroke dynamics based on medians vector proximity. J. Emerg. Trends Comput. Inform. Sci. 3, 988–993 (2012)
Maheshwary, S., Ganguly, S., Pudi, V.: Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics (2017)
Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Proc. Comput. Sci. 135, 564–569 (2018)
Xiaofeng, L., Shengfei, Z., Shengwei, Y.: Continuous authentication by free-text keystroke based on CNN plus RNN. Proc. Comput. Sci. 147, 314–318 (2019)
Baynath, P., Soyjaudah, K.M.S., Khan, M.H.-M.: Machine learning algorithm on keystroke dynamics pattern. In: 2018 IEEE Conference on Systems, Process and Control (ICSPC) (2018)
Chihaoui, T., Jlassi, H., Kachouri, R., Hamrouni, K., Akil, M.: Personal verification system based on retina and SURF descriptors. In: 2016 13th International Multi-Conference on Systems, Signals and Devices (SSD) (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gedikli, A.M., Efe, M.Ö. (2020). A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics. In: Djeddi, C., Jamil, A., Siddiqi, I. (eds) Pattern Recognition and Artificial Intelligence. MedPRAI 2019. Communications in Computer and Information Science, vol 1144. Springer, Cham. https://doi.org/10.1007/978-3-030-37548-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-37548-5_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-37547-8
Online ISBN: 978-3-030-37548-5
eBook Packages: Computer ScienceComputer Science (R0)