User Authentication by Keystroke Dynamics Using Machine Learning Algorithms
DOI:
https://doi.org//10.32628/CSEIT1953137Keywords:
Keystroke Dynamics, Pair wise User Coupling, Cyber ForensicsAbstract
Due to the expanding vulnerabilities in cyber forensics, security alone is not sufficient to forestall a rupture; however, cyber security is additionally required to anticipate future assaults or to distinguish the potential aggressor. Keystroke Dynamics has high use in cyber intelligence. The paper examines the helpfulness of keystroke dynamics to build up the individual personality. Three schemes are proposed for recognizing an individual while typing on keyboard. Lib SVM and binary SVM are proposed and their performance are shown. Lib SVM is showing a better performance when comparing with binary SVM. As the number of samples are increased it shows an increase in the accuracy. Pair wise user coupling technique is proposed. The proposed procedures are approved by utilizing keystroke information. In any case, these systems could similarly well be connected to other examples of pattern identification problems. This system is applicable in highly confidential areas like military.
References
- Bhatt, Shanthi, and T. Santhanam. "Keystroke dynamics for biometric authentication—A survey." 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering. IEEE, 2013.
- Araújo, Lívia CF, et al. "User authentication through typing biometrics features." IEEE transactions on signal processing53.2 (2005): 851-855.
- Bours P., Mondal S. “Continuous authentication with keystroke dynamics. “Norwegian Information Security Laboratory NISlab (2015): 41-58
- Monaco, John V., et al. "One-handed keystroke biometric identification competition." 2015 International Conference on Biometrics (ICB). IEEE, 2015.
- Obaidat, Mohammad S., and David T. Macchiarolo. "An online neural network system for computer access security." IEEE Transactions on Industrial electronics 40.2 (1993): 235-242.
- Tappert, Charles C., Mary Villani, and Sung-Hyuk Cha. "Keystroke biometric identification and authentication on long-text input." Behavioral biometrics for human identification: Intelligent applications. IGI global, 2010. 342-367.
- Ahmed, Ahmed A., and Issa Traore. "Biometric recognition based on free-text keystroke dynamics." IEEE transactions on cybernetics 44.4 (2013): 458-472
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT
This work is licensed under a Creative Commons Attribution 4.0 International License.