Active Authentication of Keyboard Users: Performance Evaluation on 736 Subjects

04/22/2018
by   Md Enamul Karim, et al.
0

Keystroke timing based active authentication systems are conceptually attractive because: (i) they use the keyboard as the sensor and are not hardware-cost prohibitive, and (ii) they use the keystrokes generated from normal usage of computers as input and are not interruptive. Several experiments have been reported on the performance of keystroke based authentication using small datasets. None of them, however, study a practical active authentication system, and the feasibility of keystroke based active authentication system for large scale and continuous deployment is still not demonstrated in the literature. We investigate this issue and establish that keystroke based active authentication systems can be highly accurate and scalable. We use a real active authentication system that we developed and analyze a dataset large enough to produce statistically significant results. We also present empirical methodologies used for characterizing various design parameters of the developed system.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/29/2019

MultiLock: Mobile Active Authentication based on Multiple Biometric and Behavioral Patterns

In this paper we evaluate mobile active authentication based on an ensem...
research
03/08/2023

Keystroke Dynamics: Concepts, Techniques, and Applications

Reliably identifying and authenticating users remains integral to comput...
research
06/21/2020

Quickest Intruder Detection for Multiple User Active Authentication

In this paper, we investigate how to detect intruders with low latency f...
research
09/21/2023

De-authentication using Ambient Light Sensor

While user authentication happens before initiating or resuming a login ...
research
09/12/2022

Prototyping a Serial Number Based Authentication Model for a Computer in a Wireless Local Area Network

With the increase of wireless LAN usage in homes and enterprises due to ...
research
07/25/2022

Techniques for Continuous Touch-Based Authentication Modeling

The field of touch-based authentication has been rapidly developing over...
research
10/02/2022

GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System

Previous studies have shown that commonly studied (vanilla) implementati...

Please sign up or login with your details

Forgot password? Click here to reset