AIセキュリティポータル K Program
KeyDetect --Detection of anomalies and user based on Keystroke Dynamics
Share
Abstract
Cyber attacks has always been of a great concern. Websites and services with poor security layers are the most vulnerable to such cyber attacks. The attackers can easily access sensitive data like credit card details and social security number from such vulnerable services. Currently to stop cyber attacks, various different methods are opted from using two-step verification methods like One-Time Password and push notification services to using high-end bio-metric devices like finger print reader and iris scanner are used as security layers. These current security measures carry a lot of cons and the worst is that user always need to carry the authentication device on them to access their data. To overcome this, we are proposing a technique of using keystroke dynamics (typing pattern) of a user to authenticate the genuine user. In the method, we are taking a data set of 51 users typing a password in 8 sessions done on alternate days to record mood fluctuations of the user. Developed and implemented anomaly-detection algorithm based on distance metrics and machine learning algorithms like Artificial Neural networks (ANN) and convolutional neural network (CNN) to classify the users. In ANN, we implemented multi-class classification using 1-D convolution as the data was correlated and multi-class classification with negative class which was used to classify anomaly based on all users put together. We were able to achieve an accuracy of 95.05% using ANN with Negative Class. From the results achieved, we can say that the model works perfectly and can be bought into the market as a security layer and a good alternative to two-step verification using external devices. This technique will enable users to have two-step security layer without worrying about carry an authentication device.
Keystroke biometric systems for user authentication
M. L. Ali, J. V. Monaco, C. C. Tappert, M. Qiu
Published: 2017
Svm based gender classification using iris images
A. Bansal, R. Agarwal, R. Sharma
Published: 2012
Identifying emotional states using keystroke dynamics
C. Epp, M. Lippold, R. L. Mandryk
Published: 2011
Identifying fatigue through keystroke dynamics
J. Hayes
Published: 2018
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords
S. Z. S. Idrus, E. Cherrier, C. Rosenberger, P. Bours
Published: 2014
Comparing anomaly-detection algorithms for keystroke dynamics
K. S. Killourhy, R. A. Maxion
Published: 2009
Keystroke dynamic classification using machine learning for password authorization
Y. Muliono, H. Ham, D. Darmawan
Published: 2018
Keystroke dynamics for user authentication and identification by using typing rhythm
R. A. Patil, A. L. Renke
Published: 2016
Active contact enhancements with stretchable soft layers and piezoresistive tactile array for robotic grippers
G. Ponraj, A. V. Prituja, C. Li, A. Bamotra, Z. Guoniu, S. K. Kirthika, N. V. Thakor, A. B. Soares, H. Ren
Published: 2019
A machine learning approach to keystroke dynamics based user authentication
K. Revett, F. Gorunescu, M. Gorunescu, M. Ene, P. S. T. Magalhaes, H. D. d. Santos
Published: 2007
Protection of kids from internet threats: A machine learning approach for classification of age-group based on typing pattern
S. Roy, U. Roy, D. Sinha
Published: 2018
Dynamic object removal for effective slam
P. K. Uppala, A. Bamotra, R. Kolamuri
Published: 2023
From information security to cyber security
R. Von Solms, J. Van Niekerk
Published: 2013
Design and fabrication of soft-bodied 3-d tactile sensors with magnetometers
P. Walia, A. Bamotra, A. Prituja, H. Ren
Published: 2018
Keystroke-based user identification on smart phones
S. Zahid, M. Shahzad, S. A. Khayam, M. Farooq
Published: 2009
Share