Skip to main content

Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics

  • Conference paper
  • First Online:
  • 1376 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1219))

Abstract

Keystroke dynamics has been recently proved to be an effective behavioral measure to detect subjects who provide false demographic information in online contexts. However, current techniques still suffer from some limits that restrict their practical application, such as the use of errors as a key feature to train the lie detectors and the absence of normalized features. Here, an extension of a keystroke dynamics technique, which was recently proposed to detect faked identities, is reported with the goal to overcome these limitations. Using a Quadratic Discriminant Analysis an accuracy up to 92% in the identification of faked identities has been reached, even if errors were excluded from predictors and normalized features were included. The classification model performs similarly to those previously proposed, with a slightly lower accuracy (−3%) but overcoming their important practical limitations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Cano, A.E., Fernandez, M., Alani, H.: Detecting child grooming behaviour patterns on social media. In: Aiello, L.M., McFarland, D. (eds.) SocInfo 2014. LNCS, pp. 412–427. Springer, Cham (2014)

    Chapter  Google Scholar 

  2. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80 (2005)

    Google Scholar 

  3. Moskovitch, R., Feher, C., Messerman, A., Kirschnick, N., Mustafic, T., Camtepe, A., Löhlein, B., Heister, U., Möller, S., Rokach, L., Elovici, Y.: Identity theft, computers and behavioral biometrics. In: 2009 IEEE International Conference on Intelligence and Security Informatics (InISI 2009) (2009)

    Google Scholar 

  4. Ahmad, N., Szymkowiak, A., Campbell, P.A.: Keystroke dynamics in the pre-touchscreen era. Front. Hum. Neurosci. 7, 835 (2013). https://doi.org/10.3389/fnhum.2013.00835

    Article  Google Scholar 

  5. Monrose, F., Rubin, A.D.: Keystroke dynamics as a biometric for authentication. Future Gener. Comput. Syst. 16, 351–359 (2000). https://doi.org/10.1016/S0167-739X(99)00059-X

    Article  Google Scholar 

  6. Spolaor, R., Li, Q., Monaro, M., Conti, M., Gamberini, L., Sartori, G.: Biometric authentication methods on smartphones: a survey. PsychNology J. 14, 87–98 (2016)

    Google Scholar 

  7. Teh, P.S., Teoh, A.B., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. (2013). https://doi.org/10.1155/2013/408280

    Article  Google Scholar 

  8. Grimes, G., Jenkins, J.L., Valacich, J.S.: Assessing credibility by monitoring changes in typing behavior: the keystrokes dynamics deception detection model. In: Hawaii International Conference on System Sciences, Deception Detection Symposium (2013)

    Google Scholar 

  9. Monaro, M., Spolaor, R., QianQian, L., Conti, M., Gamberini, L., Sartori, G.: Type me the truth!: Detecting deceitful users via keystroke dynamics. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, ARES 2017, Reggio Calabria, Italy (2017)

    Google Scholar 

  10. Monaro, M., Businaro, M., Spolaor, R., Li, Q.Q., Conti, M., Gamberini, L., Sartori, G.: The online identity detection via keyboard dynamics. In: Arai, K., Bhatia, R., Kapoor, S. (eds.) FTC 2018. AISC, vol. 881, pp. 342–357. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-02683-7_24

    Chapter  Google Scholar 

  11. Monaro, M., Galante, C., Spolaor, R., Li, Q.Q., Gamberini, L., Conti, M., Sartori, G.: Covert lie detection using keyboard dynamics. Sci. Rep. 8, 1976 (2018). https://doi.org/10.1038/s41598-018-20462-6

    Article  ADS  Google Scholar 

  12. Monaro, M., Gamberini, L., Sartori, G.: Identity verification using a kinematic memory detection technique. In: Hale, K., Stanney, K. (eds.) Advances in Neuroergonomics and Cognitive Engineering. Advances in Intelligent Systems and Computing, vol. 488, pp. 123–132. Springer, Cham (2017)

    Chapter  Google Scholar 

  13. Vrij, A., Leal, S., Granhag, P.A., Mann, S., Fisher, R.P., Hillman, J., Sperry, K.: Outsmarting the liars: the benefit of asking unanticipated questions. Law Hum Behav. 33, 159–166 (2009). https://doi.org/10.1007/s10979-008-9143-y

    Article  Google Scholar 

  14. Sammut, C., Webb, G.: Encyclopedia of Machine Learning and Data Mining. Springer, US (2017)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matteo Cardaioli .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cardaioli, M., Monaro, M., Sartori, G., Conti, M. (2020). Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke Dynamics. In: Corradini, I., Nardelli, E., Ahram, T. (eds) Advances in Human Factors in Cybersecurity. AHFE 2020. Advances in Intelligent Systems and Computing, vol 1219. Springer, Cham. https://doi.org/10.1007/978-3-030-52581-1_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-52581-1_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-52580-4

  • Online ISBN: 978-3-030-52581-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics