Abstract
In recent years, user authentication based on mouse and keystroke dynamic is the most wanted topic to identify the external user and to secure information. Additionally based on the movement of the mouse and typing speed of keystroke the correct user was identified. But the problems of existing approaches are complicated data, data error, and malicious events. To overcome these threats, a novel cat recurrent neural model (CRNM) is proposed to identify the correct user and improve the accuracy rate. In this work, the CRNM approach is introduced to minimize the error rate, to detect unauthorized users by analyzing the user’s mouse and keystroke dynamic. Consequently, the trained datasets verify the inputs and identify the correct user. Thus the proposed CRNM has been implemented in the python framework, to identify the correct user. Moreover, the proposed model is validated with other existing deep learning models in terms of accuracy, false acceptance rate (FAR), F-measure, recall, false negative rate (FNR), precision, and error rate.













Similar content being viewed by others
References
Andrean, A., Jayabalan, M., & Thiruchelvam, V. (2020). Keystroke Dynamics Based User Authentication using Deep Multilayer Perceptron. International Journal of Machine Learning and Computing, 10(1), 134–139. https://doi.org/10.18178/ijmlc.2020.10.1.910
Antal, M., & Egyed-Zsigmond, E. (2019). Intrusion detection using mouse dynamics. IET Biometrics, 8(5), 285–294. https://doi.org/10.1049/iet-bmt.2018.5126
Bernardi, M. L., Cimitile, M., Martinelli, F., & Mercaldo, F. (2019). Keystroke analysis for user identification using deep neural networks. In 2019 international joint conference on neural networks (IJCNN). IEEE. https://doi.org/10.1109/IJCNN.2019.8852068
Biswas, D., Everson, L., Liu, M., Panwar, M., Verhoef, B. E., Patki, S., Kim, C. H., Acharyya, A., Hoof, C. V., Konijnenburg, M., & Helleputte, N. V. (2019). CorNET: Deep learning framework for PPG-based heart rate estimation and biometric identification in ambulant environment. IEEE Transactions on Biomedical Circuits and Systems, 13(2), 282–291. https://doi.org/10.1109/TBCAS.2019.2892297
Brocardo, M. L., Traore, I., & Woungang, I. (2019). Continuous authentication using writing style. In Biometric-based physical and cybersecurity systems (pp. 211–232). Springer. https://doi.org/10.1007/978-3-319-98734-7_8
Çeker, H., & Upadhyaya, S. (2017). Sensitivity analysis in keystroke dynamics using convolutional neural networks. In 2017 IEEE workshop on information forensics and security (WIFS) (pp. 1–6). https://doi.org/10.1109/WIFS.2017.8267667
Chatterjee, K. (2019). Continuous user authentication system: A risk analysis based approach. Wireless Personal Communications, 108(1), 281–295. https://doi.org/10.1007/s11277-019-06403-0
Dahia, G., Jesus, L., & Segundo M. P. (2020). Continuous authentication using biometrics: An advanced review. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. https://doi.org/10.1002/widm.1365
Elliot, K., Graham, J., Yassin, Y., Ward, T., Caldwell, J., & Attie, T. (2019). A comparison of machine learning algorithms in keystroke dynamics. In 2019 international conference on computational science and computational intelligence (CSCI) (pp 127–132). https://doi.org/10.1109/CSCI49370.2019.00028
Gedikli, A. M., & Efe, M. O. (2019). A simple authentication method with multilayer feedforward neural network using keystroke dynamics. In Mediterranean conference on pattern recognition and artificial intelligence. Springer. https://doi.org/10.1007/978-3-030-37548-5_2
Jabbari, A., & Mohasefi, J. B. (2021). improvement of a user authentication scheme for wireless sensor networks based on internet of things security. Wireless Personal Communications, 116(3), 2565–2591. https://doi.org/10.1007/s11277-020-07811-3
Kandar, S., Pal, S., & Dhara, B. C. (2021). A biometric based remote user authentication technique using smart card in multi-server environment. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-08501-4
Kasprowski, P., & Harezlak, K. (2018). Fusion of eye movement and mouse dynamics for reliable behavioral biometrics. Pattern Analysis and Applications, 21(1), 91–103. https://doi.org/10.1007/s10044-016-0568-5
Kochegurova, E. A., & Martynova, Y. A. (2020). Aspects of continuous user identification based on free texts and hidden monitoring. Programming and Computer Software, 46(1), 12–24. https://doi.org/10.1134/S036176882001003X
Kulkarni, S., & Fadewar, H. (2020). Accuracy comparison of classification techniques for mouse dynamics-based biometric CaRP. In Proceedings of the 3rd international conference on computational intelligence and informatics. Springer. https://doi.org/10.1007/978-981-15-1480-7_61
Liang, Y., Samtani, S., Guo, B., & Yu, Z. (2020). Behavioral biometrics for continuous authentication in the internet-of-things era: An artificial intelligence perspective. IEEE Internet of Things Journal, 7(9), 9128–9143. https://doi.org/10.1109/JIOT.2020.3004077
Lu, L., Yu, J., Chen, Y., Liu, H., Zhu, Y., Kong, L., & Li, M. (2019). Lip reading-based user authentication through acoustic sensing on smartphones. IEEE/ACM Transactions on Networking, 27(1), 447–460. https://doi.org/10.1109/TNET.2019.2891733
Manandhar, R., Wolf, S., & Borowczak, M. (2019). One-class classification to continuously authenticate users based on keystroke timing dynamics. In 2019 18th IEEE international conference on machine learning and applications (ICMLA). IEEE. https://doi.org/10.1109/ICMLA.2019.00207
Matthiesen, J. J., & Brefeld, U. (2020). assessing user behavior by mouse movements. In International conference on human-computer interaction. Springer. https://doi.org/10.1007/978-3-030-50726-8_9
Nikravan, M., & Reza, A. (2020). A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things. Wireless Personal Communications, 111(1), 463–494. https://doi.org/10.1007/s11277-019-06869-y
Rayani, P. K., & Changder, S. (2019). Continuous gait authentication against unauthorized smartphone access through Naïve Bayes classifier. In International conference on intelligent computing and communication. Springer. https://doi.org/10.1007/978-981-15-1084-7_78
Rocha, R., Carneiro, D., & Novais, P. (2020). Continuous authentication with a focus on explainability. Neurocomputing. https://doi.org/10.1016/j.neucom.2020.02.122
Shah, S. W., & Kanhere, S. S. (2019). Recent trends in user authentication—A survey. IEEE Access, 7, 112505–112519. https://doi.org/10.1109/ACCESS.2019.2932400
Shamshad, S., Mahmood, K., & Kumari, S. (2020). Comments on “A multi-factor user authentication and key agreement protocol based on bilinear pairing for the internet of things.” Wireless Personal Communications. https://doi.org/10.1007/s11277-020-07038-2
Toala, R., Durães, D., & Novais, P. (2019). Human-computer interaction in intelligent tutoring systems. In International symposium on distributed computing and artificial intelligence. Springer. https://doi.org/10.1007/978-3-030-23887-2_7
Tsai, C. J., & Huang, P. H. (2020). Keyword-based approach for recognizing fraudulent messages by keystroke dynamics. Pattern Recognition, 98, 107067. https://doi.org/10.1016/j.patcog.2019.107067
Tsai, C. J., & Shih, K. J. (2019). Mining a new biometrics to improve the accuracy of keystroke dynamics-based authentication system on free-text. Applied Soft Computing, 80, 125–137. https://doi.org/10.1016/j.asoc.2019.03.033
Yang, L., Chen, Y. C., Pan, H., Ding, D., Xue, G., Kong, L., Yu, J., & Li, M. (2020). MagPrint: Deep learning based user fingerprinting using electromagnetic signals. In IEEE INFOCOM 2020-IEEE conference on computer communications. IEEE. https://doi.org/10.1109/INFOCOM41043.2020.9155534
Acknowledgements
None.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
The authors declare that they have no conflict of interest.
Ethical Approval
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Informed Consent
For this type of study formal consent is not required.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Thomas, P.A., Mathew, K.P. An Efficient Optimized Mouse and Keystroke Dynamics Framework for Continuous Non-Intrusive User Authentication. Wireless Pers Commun 124, 401–422 (2022). https://doi.org/10.1007/s11277-021-09363-6
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-09363-6