Skip to main content

On the Use of Rough Sets for User Authentication Via Keystroke Dynamics

  • Conference paper
Progress in Artificial Intelligence (EPIA 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4874))

Included in the following conference series:

Abstract

Keystroke dynamics is a behavioral biometric that is based on how a user enters their login details. In this study, a set of eight attributes were extracted during the course of entering login details. This collection of attributes was used to form a reference signature (a biometrics identification record) for subsequent authentication requests. The algorithm for the authentication step entails transforming the attributes into a discretised form based on the amino acid alphabet. A set of bioinformatics based algorithms are then used to perform the actual authentication test. In addition, the use of rough sets was employed in this study to determine if subsets of attributes were more important in the classification (authentication) than others. Lastly, the results of this study indicate that the error rate is less than 1% in the majority of the cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gaines, R., et al.: Authentication by keystroke timing: Some preliminary results. Rand Report R-256-NSF, Rand Corp. (1980)

    Google Scholar 

  2. Pawlak, Z.: Rough Sets. International Journal of Computer and Information Sciences 11, 341–356 (1982)

    Article  MathSciNet  Google Scholar 

  3. Pawlak, Z.: Rough sets – Theoretical aspects of reasoning about data. Kluwer, Dordrecht (1991)

    MATH  Google Scholar 

  4. Magalhães, S.T., Santos, H.D.: An improved statistical keystroke dynamics algorithm. In: Proceedings of the IADIS MCCSIS 2005 (2005)

    Google Scholar 

  5. Magalhães, S.T., Revett, K.: Password Secured Sites – Stepping Forward with Keystroke Dynamics. In: International Conference on Next Generation Web Service Practises, Seoul, Korea (2005)

    Google Scholar 

  6. Joyce, R., Gupta, G.: Identity authorization based on keystroke latencies. Communications of the ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  7. Monrose, F., Rubin, A.D.: Authentication via Keystroke Dynamics. In: Proceedings of the Fourth ACM Conference on Computer and Communication Security, Zurich, Switzerland (1997)

    Google Scholar 

  8. Monrose, F., Rubin, A.D.: Keystroke Dynamics as a Biometric for Authentication. Future Generation Computing Systems (FGCS) Journal: Security on the Web (2000)

    Google Scholar 

  9. Hussien, B., Bleha, S., McLaren, R.: An application of fuzzy algorithms in a computer access security system. Pattern Recognition Letters 9, 39–43 (1989)

    Article  Google Scholar 

  10. de Ru, W.G., Eloff, J.: Enhanced Password Authentication through Fuzzy Logic. IEEE Expert 12(6), 38–45 (1997)

    Article  Google Scholar 

  11. Obaidat, M.S., Sadoun, B.: A Simulation Evaluation Study of neural network techniques to Computer User Identification. Information Sciences 102, 239–258 (1997)

    Article  Google Scholar 

  12. de Oliveira, M.V.S., Kinto, E., Hernandez, E.D.M., de Carvalho, T.C.: User Authentication Based on Human Typing Patterns with Artificial Neural Networks and Support Vector Machines. In: SBC 2005 (2005)

    Google Scholar 

  13. Sung, K.S., Cho, S.: GA SVM Wrapper Ensemble for Keystroke Dynamics Authentication. In: International Conference on Biometrics, Hong Kong, pp. 654–660 (2006)

    Google Scholar 

  14. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Transactions on Information and System Security 5(4), 367–397 (2002)

    Article  Google Scholar 

  15. Revett, K.: On the Use of Multiple Sequence Alignment for User Authentication via Keystroke Dynamics. In: International Conference on Global eSecurity (ICGeS), April 16-18, 2007, University of East London, pp. 112-120 (2007)

    Google Scholar 

  16. Revett, K., Magalhaes, S., Santos, H.: Developing a Keystroke Dynamics Based Agent Using Rough Sets. In: The 2005 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology Workshop on Rough Sets and Soft Computing in Intelligent Agents and Web Technology, Compiegne, France, September 19-22, 2005, pp. 56–61 (2005)

    Google Scholar 

  17. Needleman, S.B., Wunsch, C.D.: A general method applicable to the search for similarities in the amino acid sequence of two proteins. Mol. Biol. 48, 443–453 (1970)

    Article  Google Scholar 

  18. Smith, T.F., Waterman, M.S.: Identification of common molecular subsequences. J. Mol. Biol. 147, 95–197 (1981)

    Article  Google Scholar 

  19. Slezak, D.: Approximate Entropy Reducts. Fundamenta Informaticae (2002)

    Google Scholar 

  20. Bazan, J., Szczuka, M.: The Rough Set Exploration System. In: Peters, J.F., Skowron, A. (eds.) Transactions on Rough Sets III. LNCS, vol. 3400, pp. 37–56. Springer, Heidelberg (2005) http://logic.mimuw.edu.pl/~rses

    Google Scholar 

  21. Bazan, J., Nguyen, H.S., Nguyen, S.H., Synak, P., Wróblewski, J.: Rough set algorithms in classification problems. In: Studies in Fuzziness and Soft Computing, vol. 56, pp. 49–88. Physica-Verlag, Heidelberg (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

José Neves Manuel Filipe Santos José Manuel Machado

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Revett, K., Tenreiro de Magalhães, S., Santos, H.M.D. (2007). On the Use of Rough Sets for User Authentication Via Keystroke Dynamics. In: Neves, J., Santos, M.F., Machado, J.M. (eds) Progress in Artificial Intelligence. EPIA 2007. Lecture Notes in Computer Science(), vol 4874. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77002-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77002-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77000-8

  • Online ISBN: 978-3-540-77002-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics