DOI QR코드

DOI QR Code

자유로운 문자열의 키스트로크 다이나믹스와 일범주 분류기를 활용한 사용자 인증

User Authentication Based on Keystroke Dynamics of Free Text and One-Class Classifiers

  • 서동민 (서울과학기술대학교 데이터사이언스학과) ;
  • 강필성 (고려대학교 산업경영공학부)
  • Seo, Dongmin (Department of Data Science, Seoul National University of Science and Technology) ;
  • Kang, Pilsung (School of Industrial Management Engineering, Korea University)
  • 투고 : 2015.12.30
  • 심사 : 2016.04.27
  • 발행 : 2016.08.15

초록

User authentication is an important issue on computer network systems. Most of the current computer network systems use the ID-password string match as the primary user authentication method. However, in password-based authentication, whoever acquires the password of a valid user can access the system without any restrictions. In this paper, we present a keystroke dynamics-based user authentication to resolve limitations of the password-based authentication. Since most previous studies employed a fixed-length text as an input data, we aims at enhancing the authentication performance by combining four different variable creation methods from a variable-length free text as an input data. As authentication algorithms, four one-class classifiers are employed. We verify the proposed approach through an experiment based on actual keystroke data collected from 100 participants who provided more than 17,000 keystrokes for both Korean and English. The experimental results show that our proposed method significantly improve the authentication performance compared to the existing approaches.

키워드

참고문헌

  1. Ahmed, A. A. and Traore, I. (2014), Biometric recognition based on free-text keystroke dynamics, Cybernetics, IEEE Transactions on, 44(4), 458-472. https://doi.org/10.1109/TCYB.2013.2257745
  2. Alsultan, A. and Warwick, K. (2013), Keystroke dynamics authentication : a survey of free-text methods, International Journal of Computer Science Issues, 10(4), 1-10.
  3. Ashbourn, J. (2000), The distinction between authentication and identification, Avanti Biometric Reference Site, http://ntlworld.com/avanti.
  4. Bours, P. and Mondal, S. (2015), Continuous Authentication with Keystroke Dynamics, Recent advances in user authentication using keystroke dynamics biometrics, 41-58, Science Gate Publishing, Xanthi, Greece.
  5. David, M. J. (2001), One-class classification : Concept-learning in the absence of counter-examples, ASCI dissertation series, 65, Delft University of Technology, CD Delft, Netherlands.
  6. Davoudi, H. and Kabir, E. (2009) A new distance measure for free text keystroke authentication, Computer Conference 2009, CSICC 2009, 14th International CSI, IEEE, 570-575.
  7. Gunetti, D. and Picardi, C. (2005), Keystroke analysis of free text, ACM Transactions on Information and System Security (TISSEC), 8(3), 312-347. https://doi.org/10.1145/1085126.1085129
  8. Hayashi, et al. (2013), Casa : context-aware scalable authentication, Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM.
  9. Jain, et al. (2004), An introduction to biometric recognition, Circuits and Systems for Video Technology, IEEE Transactions on, 14(1), 44-20.
  10. Jain, et al. (2006), Biometrics: a tool for information security, Information Forensics and Security, IEEE Transactions on, 1(2), 125-143. https://doi.org/10.1109/TIFS.2006.873653
  11. Kaganov, et al. (2014), Hybrid method for active authentication using keystroke dynamics, Hybrid Intelligent Systems (HIS), 2014 14th International Conference on, IEEE, 61-66.
  12. Kang, P. and Cho, S. (2015), Keystroke dynamics-based user authentication using long and free text strings from various input devices, Information Sciences, 308, 72-93. https://doi.org/10.1016/j.ins.2014.08.070
  13. Kang, P., Kim, D., Lee, S., Doh, S., and Cho, S. (2012), Estimating the reliability of virtual metrology predictions in semiconductor manufacturing : A novelty detection-based approach, Journal of the Korean Institute of Industrial Engineers, 38(1), 46-56. https://doi.org/10.7232/JKIIE.2012.38.1.046
  14. Kassim, M. M. and Sujitha, A. (2013), ProcurePass : A User Authentication Protocol to Resist Password Stealing and Password Reuse Attack, Computational and Business Intelligence (ISCBI), 2013 International Symposium on, IEEE, 31-34.
  15. Manevitz, L. M. and Yousef, M. (2002), One-class SVMs for document classification, the Journal of machine Learning research, 2, 139-154.
  16. Monrose, F. and Rubin, A. D. (2000), Keystroke dynamics as a biometric for authentication, Future Generation computer systems, 16(4), 351-359. https://doi.org/10.1016/S0167-739X(99)00059-X
  17. Niinuma, et al. (2010), Soft biometric traits for continuous user authentication, Information Forensics and Security, IEEE Transactions on, 5(4), 771-780. https://doi.org/10.1109/TIFS.2010.2075927
  18. Roth, et al. (2013), Biometric authentication via keystroke sound, Biometrics (ICB), 2013 International Conference on, IEEE, 1-8.
  19. Samura, T. and Nishimura, H. (2012), Influence of Keyboard Difference on Personal Identification by Keystroke Dynamics in Japanese Free Text Typing, Emerging Trends in Engineering and Technology (ICETET), 2012 Fifth International Conference on, IEEE, 30-35.
  20. Shimshon, et al. (2010), Continuous verification using keystroke dynamics, Computational Intelligence and Security (CIS), 2010 International Conference on, IEEE, 411-415.