Keystroke dynamics identity verification - its problems and practical solutions

被引:87
作者
Yu, EZ [1 ]
Cho, S [1 ]
机构
[1] Seoul Natl Univ, Coll Engn, Dept Ind Engn, Seoul 151744, South Korea
关键词
keystroke dynamics identify verification; novelty detection; autoassociative MLP; support vector machine; feature subset selection; ensemble based on feature selection;
D O I
10.1016/j.cose.2004.02.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Password is the most widely used identity verification method in computer security domain. However, because of its simplicity, it is vulnerable to imposter attacks. Use of keystroke dynamics can result in a more secure verification system. Recently, Cho et at. (J Organ Comput Electron Commerce 10 (2000) 295) proposed autoassociative neural network approach, which used only the user's typing patterns, yet reporting a low error rate: 1.0% false rejection rate (FRR) and 0% false acceptance rate (FAR). However, the previous research had some limitations: (1) it took too long to train the model; (2) data were preprocessed subjectively by a human; and (3) a large data set was required. In this article, we propose the corresponding solutions for these limitations with an SVM novelty detector, GA-SVM wrapper feature subset selection, and an ensemble creation based on feature selection, respectively. Experimental results show that the proposed methods are promising, and that the keystroke dynamics is a viable and practical way to add more security to identity verification. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:428 / 440
页数:13
相关论文
共 20 条
[1]  
[Anonymous], 1989, GENETIC ALGORITHM SE
[2]  
[Anonymous], 1999, MSRTR9987
[3]  
[Anonymous], 1972, COMPLEXITY COMPUTER
[4]   Bagging predictors [J].
Breiman, L .
MACHINE LEARNING, 1996, 24 (02) :123-140
[5]   USER IDENTIFICATION VIA KEYSTROKE CHARACTERISTICS OF TYPED NAMES USING NEURAL NETWORKS [J].
BROWN, M ;
ROGERS, SJ .
INTERNATIONAL JOURNAL OF MAN-MACHINE STUDIES, 1993, 39 (06) :999-1014
[6]  
Byun H, 2002, LECT NOTES COMPUT SC, V2388, P213
[7]   Web-based keystroke dynamics identity verification using neural network [J].
Cho, S ;
Han, C ;
Han, DH ;
Kim, HI .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2000, 10 (04) :295-307
[8]  
Dasarathy B. V., 1979, Proceedings of the International Conference on Cybernetics and Society, P218
[9]  
GAINES R, 1980, R256NSF RAND CORP
[10]  
Ho TK, 1998, IEEE T PATTERN ANAL, V20, P832, DOI 10.1109/34.709601