Abstract
Free-text keystroke dynamics is a method of verifying users’ identity based on their unique pattern of typing a spontaneous text on a keyboard. When applied in remote systems, it can add an additional layer of security that can detect compromised accounts. Therefore, service providers can be more certain that remote systems accounts would not be compromised by malicious attackers. Free-text keystroke dynamics usually involve the extraction of n-graphs, which represent the latency between n consecutive events. These n-graphs are then integrated with one of the various existing machine learning algorithms. To the best of our knowledge, n-graphs are the most widely used feature engineering for free text keystroke dynamics. We present extended-n-graphs, an improved version of the commonly used n-graphs, based on several extended metrics that outperform the traditionally used basic n-graphs. Our technique was evaluated on top of the gradient boosting algorithm, best performing algorithm on basic n-graphs and several additional algorithms such as random forest, K-NN, SVM and MLP. Our empirical results show encouraging 4% improvement in the Area Under the Curve (AUC) when evaluated on a publicly used benchmark.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. (1995)
Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Deswarte, Y., Cuppens, F., Jajodia, S., Wang, L. (eds.) SEC 2004. ITIFIP, vol. 147, pp. 275–289. Springer, Boston, MA (2004). https://doi.org/10.1007/1-4020-8143-X_18
Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)
Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(4), 367–397 (2002)
Messerman, A., Mustafić, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1–8. IEEE, October 2011
Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: Some preliminary results (No. RAND-R-2526-NSF). Rand Corp, Santa Monica (1980)
Alsultan, A., Warwick, K.: User-friendly free-text keystroke dynamics authentication for practical applications. In: 2013 IEEE International Conference on Systems, Man, and Cybernetics, pp. 4658–4663. IEEE, October 2013
Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2013)
Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf. Sci. 308, 72–93 (2015)
Ali, M.L., Tappert, C.C., Qiu, M., Monaco, J.V.: Authentication and identification methods used in keystroke biometric systems. In: 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems, pp. 1424–1429. IEEE, August 2015
Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. (2013)
Friedman, J.H.: Greedy function approximation: a gradient boosting machine. Ann. Stat. 29, 1189–1232 (2001)
Mondal, S., Bours, P.: Person identification by keystroke dynamics using pairwise user coupling. IEEE Trans. Inf. Forensics Secur. 12(6), 1319–1329 (2017)
Chen, T., Guestrin, C.: XGBoost: a scalable tree boosting system. In: Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 785–794. ACM, August 2016
Monaco, J.V., et al.: One-handed keystroke biometric identification competition. In: 2015 International Conference on Biometrics (ICB), pp. 58–64. IEEE, May 2015
Shimshon, T., Moskovitch, R., Rokach, L., Elovici, Y.: Continuous verification using keystroke dynamics. In: 2010 International Conference on Computational Intelligence and Security, pp. 411–415. IEEE, December 2010
Sim, T., Janakiraman, R.: Are digraphs good for free-text keystroke dynamics? In: 2007 IEEE Conference on Computer Vision and Pattern Recognition. IEEE (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Abadi, E., Hazan, I. (2020). Improved Feature Engineering for Free-Text Keystroke Dynamics. In: Markantonakis, K., Petrocchi, M. (eds) Security and Trust Management. STM 2020. Lecture Notes in Computer Science(), vol 12386. Springer, Cham. https://doi.org/10.1007/978-3-030-59817-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-030-59817-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-59816-7
Online ISBN: 978-3-030-59817-4
eBook Packages: Computer ScienceComputer Science (R0)