These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
Cyber attacks has always been of a great concern. Websites and services with
poor security layers are the most vulnerable to such cyber attacks. The
attackers can easily access sensitive data like credit card details and social
security number from such vulnerable services. Currently to stop cyber attacks,
various different methods are opted from using two-step verification methods
like One-Time Password and push notification services to using high-end
bio-metric devices like finger print reader and iris scanner are used as
security layers. These current security measures carry a lot of cons and the
worst is that user always need to carry the authentication device on them to
access their data. To overcome this, we are proposing a technique of using
keystroke dynamics (typing pattern) of a user to authenticate the genuine user.
In the method, we are taking a data set of 51 users typing a password in 8
sessions done on alternate days to record mood fluctuations of the user.
Developed and implemented anomaly-detection algorithm based on distance metrics
and machine learning algorithms like Artificial Neural networks (ANN) and
convolutional neural network (CNN) to classify the users. In ANN, we
implemented multi-class classification using 1-D convolution as the data was
correlated and multi-class classification with negative class which was used to
classify anomaly based on all users put together. We were able to achieve an
accuracy of 95.05% using ANN with Negative Class. From the results achieved, we
can say that the model works perfectly and can be bought into the market as a
security layer and a good alternative to two-step verification using external
devices. This technique will enable users to have two-step security layer
without worrying about carry an authentication device.
External Datasets
keystroke dynamics dataset
References
Journal of Signal Processing Systems
Keystroke biometric systems for user authentication
M. L. Ali, J. V. Monaco, C. C. Tappert, M. Qiu
Published: 2017
2012 Fourth International Conference on Computational Intelligence and Communication Networks
Svm based gender classification using iris images
A. Bansal, R. Agarwal, R. Sharma
Published: 2012
Proceedings of the sigchi conference on human factors in computing systems
Identifying emotional states using keystroke dynamics
C. Epp, M. Lippold, R. L. Mandryk
Published: 2011
The UNSW Canberra at ADFA Journal of Undergraduate Engineering Research
Identifying fatigue through keystroke dynamics
J. Hayes
Published: 2018
Computers & Security
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords
S. Z. S. Idrus, E. Cherrier, C. Rosenberger, P. Bours
Published: 2014
2009 IEEE/IFIP International Conference on Dependable Systems & Networks
Comparing anomaly-detection algorithms for keystroke dynamics
K. S. Killourhy, R. A. Maxion
Published: 2009
Procedia Computer Science
Keystroke dynamic classification using machine learning for password authorization
Y. Muliono, H. Ham, D. Darmawan
Published: 2018
International Journal of Computer Applications
Keystroke dynamics for user authentication and identification by using typing rhythm
R. A. Patil, A. L. Renke
Published: 2016
2019 IEEE 15th International Conference on Automation Science and Engineering (CASE)
Active contact enhancements with stretchable soft layers and piezoresistive tactile array for robotic grippers
G. Ponraj, A. V. Prituja, C. Li, A. Bamotra, Z. Guoniu, S. K. Kirthika, N. V. Thakor, A. B. Soares, H. Ren
Published: 2019
International Journal of Electronic Security and Digital Forensics
A machine learning approach to keystroke dynamics based user authentication
K. Revett, F. Gorunescu, M. Gorunescu, M. Ene, P. S. T. Magalhaes, H. D. d. Santos
Published: 2007
Proceedings of the International MultiConference of Engineers and Computer Scientists
Protection of kids from internet threats: A machine learning approach for classification of age-group based on typing pattern
S. Roy, U. Roy, D. Sinha
Published: 2018
Dynamic object removal for effective slam
P. K. Uppala, A. Bamotra, R. Kolamuri
Published: 2023
computers & security
From information security to cyber security
R. Von Solms, J. Van Niekerk
Published: 2013
2018 IEEE International Conference on Information and Automation (ICIA)
Design and fabrication of soft-bodied 3-d tactile sensors with magnetometers
P. Walia, A. Bamotra, A. Prituja, H. Ren
Published: 2018
International Workshop on Recent advances in intrusion detection
Keystroke-based user identification on smart phones