Skip to main content

A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics

  • Conference paper
  • First Online:
Pattern Recognition and Artificial Intelligence (MedPRAI 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1144))

Abstract

Keystroke dynamics is a widely accepted user recognition and verification behavioral biometric, which has been studied nearly for a century. Intrinsically, this biometric is used together with id/password authentication forming multi-factor authentication. There are several anomaly detection algorithms that have been proposed for this task. While some proposals handle this problem with measuring data distance by taking correlation and dependence into account, some models use complex and time-consuming models deep neural networks to train to reach the right approximation. Our paper addresses a simple, accurate and lightweight method for user authentication. We show the effectiveness of our approach through comparisons with existing methods, which have also used the CMU keystroke dynamics benchmark dataset used here too. Using feed forward multilayer neural network with resilient backpropagation, we obtained an Equal Error Rate (ERR) equal to 0.049 for authentication with overall identification accuracy of 94.7%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, H.-J.: Biometrics, is it a viable proposition for identity authentication and access control? Comput. Secur. 14, 205–214 (1995)

    Article  Google Scholar 

  2. Zhong, Y., Deng, Y.: A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. Gate to Computer Science and Research Recent Advances in User Authentication Using Keystroke Dynamics Biometrics, pp. 1–22 (2015)

    Google Scholar 

  3. Dealey, W., Dvorak, A., Merrick, N., Ford, G.: Typewriting behavior (1936)

    Google Scholar 

  4. Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. Man Mach. Stud. 28, 67–76 (1988)

    Article  Google Scholar 

  5. Goicoechea-Telleria, I., Sanchez-Reillo, R., Liu-Jimenez, J., Blanco-Gonzalo, R.: Attack potential evaluation in desktop and smartphone fingerprint sensors: can they be attacked by anyone? Wirel. Commun. Mob. Comput. 2018, 1–16 (2018)

    Article  Google Scholar 

  6. Ramachandra, R., Busch, C.: Presentation attack detection methods for face recognition systems. ACM Comput. Surv. 50, 1–37 (2017)

    Article  Google Scholar 

  7. Garofalo, G., Rimmer, V., Hamme, T., Preuveneers, D., Joosen, W.: Fishy faces: crafting adversarial images to poison face authentication (2018)

    Google Scholar 

  8. Albakri, G., Alghowinem, S.: The effectiveness of depth data in liveness face authentication using 3D sensor cameras. Sensors 19, 1928 (2019)

    Article  Google Scholar 

  9. Zhou, Z., Tang, D., Wang, X., Han, W., Xiangyu, L., Zhang, K.: Invisible mask: practical attacks on face recognition with infrared (2018)

    Google Scholar 

  10. Meng, T.C., Gupta, P., Gao, D.: I can be you: questioning the use of keystroke dynamics as biometrics. In: Proceedings of the 20th Network and Distributed System Security Symposium (2013)

    Google Scholar 

  11. Epp, C., Lippold, M., Mandryk, R.L.: Identifying emotional states using keystroke dynamics. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems - CHI (2011)

    Google Scholar 

  12. Forsen, G., Nelson, M., Staron Jr, R.: Personal attributes authentication techniques. Technical report RADC-TR-77-333, Rome Air Development Center (1977)

    Google Scholar 

  13. Spillane, R.: Keyboard apparatus for personal identification. IBM Tech. Disclosure Bull. 17(3346), 3346 (1975)

    Google Scholar 

  14. Gaines, R., Lisowski, W., Press, S., Shapiro, N.: Authentication by keystroke timing: some preliminary results. Technical Report Rand Rep. R-2560-NSF, RAND Corporation (1980)

    Google Scholar 

  15. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351–359 (2000)

    Article  Google Scholar 

  16. Alsultan, A., Warwick, K.: Keystroke dynamics authentication: a survey of free-text methods. Int. J. Comput. Sci. Issues 10, 1–10 (2013)

    Google Scholar 

  17. Banerjee, S.P., Woodard, D.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)

    Google Scholar 

  18. Bhatt, S., Santhanam, T.: Keystroke dynamics for biometric authentication—a survey. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (2013)

    Google Scholar 

  19. Crawford, H.: Keystroke dynamics: characteristics and opportunities. In: 2010 Eighth International Conference on Privacy, Security and Trust (2010)

    Google Scholar 

  20. Karnan, M., Akila, M., Krishnaraj, N.: Biometric personal authentication using keystroke dynamics: a review. Appl. Soft Comput. 11, 1565–1573 (2011)

    Article  Google Scholar 

  21. Shanmugapriya, D., Padmavathi, G.: A survey of biometric keystroke dynamics: approaches, security and challenges. Int. J. Comput. Sci. Inform. Secur. 5, 115–119 (2009)

    Google Scholar 

  22. Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013, 1–24 (2013)

    Article  Google Scholar 

  23. Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops (2012)

    Google Scholar 

  24. Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12, 1217–1222 (1990)

    Article  Google Scholar 

  25. Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP International Conference on Dependable Systems and Networks (2009)

    Google Scholar 

  26. Yu, E., Cho, S.: GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification. In: Proceedings of the International Joint Conference on Neural Networks (2003)

    Google Scholar 

  27. Souza, B., Brito, N., Neves, W., Silva, K., Lima, R., Silva, S.D.: Comparison between backpropagation and RPROP algorithms applied to fault classification in transmission lines. In: 2004 IEEE International Joint Conference on Neural Networks (IEEE Cat. No.04CH37541) (2004)

    Google Scholar 

  28. Prasad, N., Singh, R., Lal, S.P.: Comparison of back propagation and resilient propagation algorithm for spam classification. In: 2013 Fifth International Conference on Computational Intelligence, Modelling and Simulation (2013)

    Google Scholar 

  29. Swets, J.A., Pickett, R.M.: Evaluation of Diagnostic Systems: Methods from Signal Detection Theory. Academic Press, New York (1982)

    Google Scholar 

  30. Fawcett, T.: An introduction to ROC analysis. Pattern Recogn. Lett. 27, 861–874 (2006)

    Article  Google Scholar 

  31. Deng, Y., Zhong, Y.: Keystroke dynamics user authentication based on gaussian mixture model and deep belief nets. ISRN Signal Process. 2013, 1–7 (2013)

    Article  Google Scholar 

  32. Al-Jarrah, M.: An anomaly detector for keystroke dynamics based on medians vector proximity. J. Emerg. Trends Comput. Inform. Sci. 3, 988–993 (2012)

    Google Scholar 

  33. Maheshwary, S., Ganguly, S., Pudi, V.: Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics (2017)

    Google Scholar 

  34. Muliono, Y., Ham, H., Darmawan, D.: Keystroke dynamic classification using machine learning for password authorization. Proc. Comput. Sci. 135, 564–569 (2018)

    Article  Google Scholar 

  35. Xiaofeng, L., Shengfei, Z., Shengwei, Y.: Continuous authentication by free-text keystroke based on CNN plus RNN. Proc. Comput. Sci. 147, 314–318 (2019)

    Article  Google Scholar 

  36. Baynath, P., Soyjaudah, K.M.S., Khan, M.H.-M.: Machine learning algorithm on keystroke dynamics pattern. In: 2018 IEEE Conference on Systems, Process and Control (ICSPC) (2018)

    Google Scholar 

  37. Chihaoui, T., Jlassi, H., Kachouri, R., Hamrouni, K., Akil, M.: Personal verification system based on retina and SURF descriptors. In: 2016 13th International Multi-Conference on Systems, Signals and Devices (SSD) (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ahmet Melih Gedikli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gedikli, A.M., Efe, M.Ö. (2020). A Simple Authentication Method with Multilayer Feedforward Neural Network Using Keystroke Dynamics. In: Djeddi, C., Jamil, A., Siddiqi, I. (eds) Pattern Recognition and Artificial Intelligence. MedPRAI 2019. Communications in Computer and Information Science, vol 1144. Springer, Cham. https://doi.org/10.1007/978-3-030-37548-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37548-5_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37547-8

  • Online ISBN: 978-3-030-37548-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics