Skip to main content

Advertisement

Log in

An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In recent years, user authentication based on mouse and keystroke dynamic is the most wanted topic to identify the external user and to secure information. Additionally based on the movement of the mouse and typing speed of keystroke the correct user was identified. But the problems of existing approaches are complicated data, data error, and malicious events. To overcome these threats, a novel cat recurrent neural model (CRNM) is proposed to identify the correct user and improve the accuracy rate. In this work, the CRNM approach is introduced to minimize the error rate, to detect unauthorized users by analyzing the user’s mouse and keystroke dynamic. Consequently, the trained datasets verify the inputs and identify the correct user. Thus the proposed CRNM has been implemented in the python framework, to identify the correct user. Moreover, the proposed model is validated with other existing deep learning models in terms of accuracy, false acceptance rate (FAR), F-measure, recall, false negative rate (FNR), precision, and error rate.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Andrean, A., Jayabalan, M., & Thiruchelvam, V. (2020). Keystroke Dynamics Based User Authentication using Deep Multilayer Perceptron. International Journal of Machine Learning and Computing, 10(1), 134–139. https://doi.org/10.18178/ijmlc.2020.10.1.910

    Article  Google Scholar 

  2. Antal, M., & Egyed-Zsigmond, E. (2019). Intrusion detection using mouse dynamics. IET Biometrics, 8(5), 285–294. https://doi.org/10.1049/iet-bmt.2018.5126

    Article  Google Scholar 

  3. Bernardi, M. L., Cimitile, M., Martinelli, F., & Mercaldo, F. (2019). Keystroke analysis for user identification using deep neural networks. In 2019 international joint conference on neural networks (IJCNN). IEEE. https://doi.org/10.1109/IJCNN.2019.8852068

  4. Biswas, D., Everson, L., Liu, M., Panwar, M., Verhoef, B. E., Patki, S., Kim, C. H., Acharyya, A., Hoof, C. V., Konijnenburg, M., & Helleputte, N. V. (2019). CorNET: Deep learning framework for PPG-based heart rate estimation and biometric identification in ambulant environment. IEEE Transactions on Biomedical Circuits and Systems, 13(2), 282–291. https://doi.org/10.1109/TBCAS.2019.2892297

    Article  Google Scholar 

  5. Brocardo, M. L., Traore, I., & Woungang, I. (2019). Continuous authentication using writing style. In Biometric-based physical and cybersecurity systems (pp. 211–232). Springer. https://doi.org/10.1007/978-3-319-98734-7_8

  6. Çeker, H., & Upadhyaya, S. (2017). Sensitivity analysis in keystroke dynamics using convolutional neural networks. In 2017 IEEE workshop on information forensics and security (WIFS) (pp. 1–6). https://doi.org/10.1109/WIFS.2017.8267667

  7. Chatterjee, K. (2019). Continuous user authentication system: A risk analysis based approach. Wireless Personal Communications, 108(1), 281–295. https://doi.org/10.1007/s11277-019-06403-0

    Article  Google Scholar 

  8. Dahia, G., Jesus, L., & Segundo M. P. (2020). Continuous authentication using biometrics: An advanced review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. https://doi.org/10.1002/widm.1365

  9. Elliot, K., Graham, J., Yassin, Y., Ward, T., Caldwell, J., & Attie, T. (2019). A comparison of machine learning algorithms in keystroke dynamics. In 2019 international conference on computational science and computational intelligence (CSCI) (pp 127–132). https://doi.org/10.1109/CSCI49370.2019.00028

  10. Gedikli, A. M., & Efe, M. O. (2019). A simple authentication method with multilayer feedforward neural network using keystroke dynamics. In Mediterranean conference on pattern recognition and artificial intelligence. Springer. https://doi.org/10.1007/978-3-030-37548-5_2

  11. Jabbari, A., & Mohasefi, J. B. (2021). improvement of a user authentication scheme for wireless sensor networks based on internet of things security. Wireless Personal Communications, 116(3), 2565–2591. https://doi.org/10.1007/s11277-020-07811-3

    Article  Google Scholar 

  12. Kandar, S., Pal, S., & Dhara, B. C. (2021). A biometric based remote user authentication technique using smart card in multi-server environment. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08501-4

  13. Kasprowski, P., & Harezlak, K. (2018). Fusion of eye movement and mouse dynamics for reliable behavioral biometrics. Pattern Analysis and Applications, 21(1), 91–103. https://doi.org/10.1007/s10044-016-0568-5

    Article  MathSciNet  Google Scholar 

  14. Kochegurova, E. A., & Martynova, Y. A. (2020). Aspects of continuous user identification based on free texts and hidden monitoring. Programming and Computer Software, 46(1), 12–24. https://doi.org/10.1134/S036176882001003X

    Article  Google Scholar 

  15. Kulkarni, S., & Fadewar, H. (2020). Accuracy comparison of classification techniques for mouse dynamics-based biometric CaRP. In Proceedings of the 3rd international conference on computational intelligence and informatics. Springer. https://doi.org/10.1007/978-981-15-1480-7_61

  16. Liang, Y., Samtani, S., Guo, B., & Yu, Z. (2020). Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet of Things Journal, 7(9), 9128–9143. https://doi.org/10.1109/JIOT.2020.3004077

    Article  Google Scholar 

  17. Lu, L., Yu, J., Chen, Y., Liu, H., Zhu, Y., Kong, L., & Li, M. (2019). Lip reading-based user authentication through acoustic sensing on smartphones. IEEE/ACM Transactions on Networking, 27(1), 447–460. https://doi.org/10.1109/TNET.2019.2891733

    Article  Google Scholar 

  18. Manandhar, R., Wolf, S., & Borowczak, M. (2019). One-class classification to continuously authenticate users based on keystroke timing dynamics. In 2019 18th IEEE international conference on machine learning and applications (ICMLA). IEEE. https://doi.org/10.1109/ICMLA.2019.00207

  19. Matthiesen, J. J., & Brefeld, U. (2020). assessing user behavior by mouse movements. In International conference on human-computer interaction. Springer. https://doi.org/10.1007/978-3-030-50726-8_9

  20. Nikravan, M., & Reza, A. (2020). A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Personal Communications, 111(1), 463–494. https://doi.org/10.1007/s11277-019-06869-y

    Article  Google Scholar 

  21. Rayani, P. K., & Changder, S. (2019). Continuous gait authentication against unauthorized smartphone access through Naïve Bayes classifier. In International conference on intelligent computing and communication. Springer. https://doi.org/10.1007/978-981-15-1084-7_78

  22. Rocha, R., Carneiro, D., & Novais, P. (2020). Continuous authentication with a focus on explainability. Neurocomputing. https://doi.org/10.1016/j.neucom.2020.02.122

    Article  Google Scholar 

  23. Shah, S. W., & Kanhere, S. S. (2019). Recent trends in user authentication—A survey. IEEE Access, 7, 112505–112519. https://doi.org/10.1109/ACCESS.2019.2932400

    Article  Google Scholar 

  24. Shamshad, S., Mahmood, K., & Kumari, S. (2020). Comments on “A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things.” Wireless Personal Communications. https://doi.org/10.1007/s11277-020-07038-2

    Article  Google Scholar 

  25. Toala, R., Durães, D., & Novais, P. (2019). Human-computer interaction in intelligent tutoring systems. In International symposium on distributed computing and artificial intelligence. Springer. https://doi.org/10.1007/978-3-030-23887-2_7

  26. Tsai, C. J., & Huang, P. H. (2020). Keyword-based approach for recognizing fraudulent messages by keystroke dynamics. Pattern Recognition, 98, 107067. https://doi.org/10.1016/j.patcog.2019.107067

    Article  Google Scholar 

  27. Tsai, C. J., & Shih, K. J. (2019). Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text. Applied Soft Computing, 80, 125–137. https://doi.org/10.1016/j.asoc.2019.03.033

    Article  Google Scholar 

  28. Yang, L., Chen, Y. C., Pan, H., Ding, D., Xue, G., Kong, L., Yu, J., & Li, M. (2020). MagPrint: Deep learning based user fingerprinting using electromagnetic signals. In IEEE INFOCOM 2020-IEEE conference on computer communications. IEEE. https://doi.org/10.1109/INFOCOM41043.2020.9155534

Download references

Acknowledgements

None.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Princy Ann Thomas.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Ethical Approval

All applicable institutional and/or national guidelines for the care and use of animals were followed.

Informed Consent

For this type of study formal consent is not required.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Thomas, P.A., Mathew, K.P. An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication. Wireless Pers Commun 124, 401–422 (2022). https://doi.org/10.1007/s11277-021-09363-6

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-09363-6

Keywords