User Authentication by Keystroke Dynamics Using Machine Learning Algorithms

Authors

  • Najla Alavi  Computer Science and Engineering, MEA Engineering College, Perinthalmanna, Kerala, India
  • Kasim K  Computer Science and Engineering, MEA Engineering College, Perinthalmanna, Kerala, India

DOI:

https://doi.org//10.32628/CSEIT1953137

Keywords:

Keystroke Dynamics, Pair wise User Coupling, Cyber Forensics

Abstract

Due to the expanding vulnerabilities in cyber forensics, security alone is not sufficient to forestall a rupture; however, cyber security is additionally required to anticipate future assaults or to distinguish the potential aggressor. Keystroke Dynamics has high use in cyber intelligence. The paper examines the helpfulness of keystroke dynamics to build up the individual personality. Three schemes are proposed for recognizing an individual while typing on keyboard. Lib SVM and binary SVM are proposed and their performance are shown. Lib SVM is showing a better performance when comparing with binary SVM. As the number of samples are increased it shows an increase in the accuracy. Pair wise user coupling technique is proposed. The proposed procedures are approved by utilizing keystroke information. In any case, these systems could similarly well be connected to other examples of pattern identification problems. This system is applicable in highly confidential areas like military.

References

  1. Bhatt, Shanthi, and T. Santhanam. "Keystroke dynamics for biometric authentication—A survey." 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering. IEEE, 2013.
  2. Araújo, Lívia CF, et al. "User authentication through typing biometrics features." IEEE transactions on signal processing53.2 (2005): 851-855.
  3. Bours P., Mondal S. “Continuous authentication with keystroke dynamics. “Norwegian Information Security Laboratory NISlab (2015): 41-58
  4. Monaco, John V., et al. "One-handed keystroke biometric identification competition." 2015 International Conference on Biometrics (ICB). IEEE, 2015.
  5. Obaidat, Mohammad S., and David T. Macchiarolo. "An online neural network system for computer access security." IEEE Transactions on Industrial electronics 40.2 (1993): 235-242.
  6. Tappert, Charles C., Mary Villani, and Sung-Hyuk Cha. "Keystroke biometric identification and authentication on long-text input." Behavioral biometrics for human identification: Intelligent applications. IGI global, 2010. 342-367.
  7. Ahmed, Ahmed A., and Issa Traore. "Biometric recognition based on free-text keystroke dynamics." IEEE transactions on cybernetics 44.4 (2013): 458-472

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Najla Alavi, Kasim K, " User Authentication by Keystroke Dynamics Using Machine Learning Algorithms , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.400-407, May-June-2019. Available at doi : https://doi.org/10.32628/CSEIT1953137