2017 IEEE Symposium on Computers and Communications (ISCC) 2017
DOI: 10.1109/iscc.2017.8024638
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection approach to keystroke dynamics based user authentication

Abstract: Abstract-Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using keystroke dynamics. In addition, we applied a k-NN-based approach that demonstrated strong results. Most of the existing approaches use only genuine users data for training and validation. We designed a cross validation procedure with artificially generated impostor samples that improves … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 19 publications
(19 reference statements)
0
10
0
Order By: Relevance
“…This also shows that the application of KDA to a system is very safe [14]. Then, the main reason for using KDA in this research is that it does not require expensive costs (low costs) and does not need any additional devices [14][15][16] (only uses the keyboard). This differentiates KDA with another Biometric Authentication which using adding devices (such as face or fingerprints) [17].…”
Section: Introductionmentioning
confidence: 66%
“…This also shows that the application of KDA to a system is very safe [14]. Then, the main reason for using KDA in this research is that it does not require expensive costs (low costs) and does not need any additional devices [14][15][16] (only uses the keyboard). This differentiates KDA with another Biometric Authentication which using adding devices (such as face or fingerprints) [17].…”
Section: Introductionmentioning
confidence: 66%
“…Similarly, a smaller proportion of research (25%) investigated combination characteristics. The following are the research areas where researchers are interested -(a) Improving accuracy through techniques such as feature fusion [99], [100], score fusion [101], [102], feature selection [103], [104], anomaly detection [105], [106], and others. (b) Domain adaptation for cross-device validation [107], [108], (c) Real-world dataset collected using IoTenabled device with typing patterns [109], some times data are being collected in different positions [110] through a variety of applications like arithmetic games [111], e-wallet [112], video clips for emotional changing [113], (d) Usability control specifically in active authentication where data are being captured continuously [114], to balance the device and application levels security, (e) Computation and energy consumption specifically in the area of a smartphone where battery power is limited [110], (f) Design some useful intelligent applications including auto-profiling user [40], disease prediction [32], age-restricted security control, genderspecific advertisement, password recovery mechanism [115].…”
Section: G Increasing Research Trend (Contribution To Ob2)mentioning
confidence: 99%
“…This characteristic further confirms the practical feasibility of our authentication method. It is worth noticing that typical training set dimensions adopted in the related works are greater than a hundred samples [10][11][12]16]. Since the behavior of users is not necessarily repetitive, false negatives might be detected by the authentication system.…”
Section: Ba =mentioning
confidence: 99%
“…In this way, the user's drawing traits are used as a further authentication measure, beyond the secrecy of the PIN. Finally, keystroke dynamics information, describing the person's typing rhythm, can be used to enhance the security of alphanumeric passwords [11,12], or to provide free-text authentication [13].…”
Section: Introductionmentioning
confidence: 99%