Verification of computer users using keystroke dynamics

被引:151
作者
Obaidat, MS
Sadoun, B
机构
[1] MONMOUTH UNIV,CTR TECHNOL & DEV,W LONG BRANCH,NJ 07764
[2] CUNY,DEPT CIVIL ENGN,NEW YORK,NY 10031
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 1997年 / 27卷 / 02期
关键词
classifications; interkey times; key hold times; neural networks; performance evaluation;
D O I
10.1109/3477.558812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login string as characteristic patterns using pattern recognition and neural network techniques, This work is a continuation of our previous work [1]-[3] where only interkey times were used as features for identifying computer users. In this work we used the key hold times for classification and then compared the performance with the former interkey time-based technique. Then we use the combined interkey and hold times for the identification process, We applied several neural network and pattern recognition algorithms for verifying computer users as they type their password phrases. It was found that hold times are more effective than interkey times and the best identification performance was achieved by using both time measurements. An identification accuracy of 100% was achieved when the combined hold and intekey time-based approach were considered as features using the fuzzy ARTMAP, radial basis function networks (RBFN), and learning vector quantization (LVQ) neural network paradigms, Other neural network and classical pattern algorithms such as backpropagation with a sigmoid transfer function (BP, Sigm), hybrid sum-of-products (HSOP), sum-of-products (SOP), potential function and Bayes' rule algorithms gave moderate performance. Using the hold time as a feature for identifying the computer user is novel.
引用
收藏
页码:261 / 269
页数:9
相关论文
共 36 条
[1]   MATHEMATICAL FOUNDATIONS OF NEUROCOMPUTING [J].
AMARI, S .
PROCEEDINGS OF THE IEEE, 1990, 78 (09) :1443-1463
[2]  
[Anonymous], IEEE
[3]  
[Anonymous], IEEE COMPUT, DOI DOI 10.1109/2.33
[5]   COMPUTER USERS VERIFICATION USING THE PERCEPTRON ALGORITHM [J].
BLEHA, SA ;
OBAIDAT, MS .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1993, 23 (03) :900-902
[6]   DIMENSIONALITY REDUCTION AND FEATURE-EXTRACTION APPLICATIONS IN IDENTIFYING COMPUTER USERS [J].
BLEHA, SA ;
OBAIDAT, MS .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1991, 21 (02) :452-456
[7]  
BRYAN WL, 1973, PSYCHOL SKILL 3 STUD, P35
[8]  
Carpenter G. A., 1992, IJCNN International Joint Conference on Neural Networks (Cat. No.92CH3114-6), P309, DOI 10.1109/IJCNN.1992.227156
[9]   ART-2 - SELF-ORGANIZATION OF STABLE CATEGORY RECOGNITION CODES FOR ANALOG INPUT PATTERNS [J].
CARPENTER, GA ;
GROSSBERG, S .
APPLIED OPTICS, 1987, 26 (23) :4919-4930
[10]  
Duda R. O., 1973, PATTERN CLASSIFICATI, V3