Reference Hub1
Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach

Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach

Paulo H. Pisani, Ana C. Lorena
Copyright: © 2012 |Volume: 3 |Issue: 4 |Pages: 18
ISSN: 1947-928X|EISSN: 1947-9298|EISBN13: 9781466613683|DOI: 10.4018/jncr.2012100104
Cite Article Cite Article

MLA

Pisani, Paulo H., and Ana C. Lorena. "Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach." IJNCR vol.3, no.4 2012: pp.59-76. http://doi.org/10.4018/jncr.2012100104

APA

Pisani, P. H. & Lorena, A. C. (2012). Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach. International Journal of Natural Computing Research (IJNCR), 3(4), 59-76. http://doi.org/10.4018/jncr.2012100104

Chicago

Pisani, Paulo H., and Ana C. Lorena. "Comparison of Feature Vectors in Keystroke Dynamics: A Novelty Detection Approach," International Journal of Natural Computing Research (IJNCR) 3, no.4: 59-76. http://doi.org/10.4018/jncr.2012100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A number of current applications require algorithms able to extract a model from one-class data and classify unseen data as self or non-self in a novelty detection scenario, such as spam identification and intrusion detection. In this paper the authors focus on keystroke dynamics, which analyses the user typing rhythm to improve the reliability of user authentication process. However, several different features may be extracted from the typing data, making it difficult to define the feature vector. This problem is even more critical in a novelty detection scenario, when data from the negative class is not available. Based on a keystroke dynamics review, this work evaluated the most used features and evaluated which ones are more significant to differentiate a user from another using keystroke dynamics. In order to perform this evaluation, the authors tested the impact on two benchmark databases applying bio-inspired algorithms based on neural networks and artificial immune systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.