TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
نویسندگان
چکیده
Abstract Keystroke-based behavioral biometrics have been proven effective for continuous user authentication. Current state-of-the-art algorithms achieved outstanding results in long text or short collected by doing some tasks. It remains a considerable challenge to authenticate users continuously and accurately with keystroke inputs uncontrolled settings. In this work, we propose Timely method Continuous Authentication, named TKCA. integrates the key name two kinds of timing features through an embedding mechanism. And it captures relationship between context keystrokes Bidirectional Long Short-Term Memory (Bi-LSTM) network. We conduct series experiments validate on public dataset - Clarkson II completely natural setting. Experiment show that proposed TKCA achieves performance 8.28% EER when using only 30 2.78% 190 keystrokes.
منابع مشابه
Continuous User Authentication Using Keystroke Dynamics
Behavioural biometric is related to what a person does, or how the person uses the body. Keystroke dynamics (or typing rhythms) is an innovative behavioural biometric technique, refers to a user’s habitual typing characteristics. These typing characteristics are believed to be unique among large populations. Keystroke dynamics allows for the design of more robust authentication systems than tra...
متن کاملContinuous Authentication with Keystroke Dynamics
In this chapter we will discuss how keystroke dynamics can be used for true continuous authentication.We have collected keystroke dynamics data of 53 participants who used the computer freely and we have analysed the collected data. We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the ...
متن کاملUser Authentication Based On Keystroke Dynamics
The most common way to enforce access control is user authentication based on username and password. This form of access control has many flaws which make it vulnerable to hacking. Biometric authentication such as the keystroke dynamics is used in which the keyboard is used in order to identify users. Then the classifier is tailored to each user to find out whether the given user is genuine or ...
متن کاملA machine learning approach to keystroke dynamics based user authentication
The majority of computer systems employ a login ID and password as the principal method for access security. In stand-alone situations, this level of security may be adequate, but when computers are connected to the internet, the vulnerability to a security breach is increased. In order to reduce vulnerability to attack, biometric solutions have been employed. In this paper, we investigate the ...
متن کاملEnhanced User Authentication Through Keystroke Biometrics
In this paper, we look at several metrics for keystroke-enhanced user authentication. We begin by introducing keystroke biometrics and looking at its advantages and disadvantages. We examine a statistical analysis method described in the current literature and show through experimental data how the metric of consecutive keystroke latencies is inadequate for user authentication. The insufficienc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybersecurity
سال: 2021
ISSN: ['2523-3246']
DOI: https://doi.org/10.1186/s42400-021-00075-9