Conditional Generative Adversarial Network for keystroke presentation attack

12/16/2022
by   Idoia Eizaguirre-Peral, et al.
0

Cybersecurity is a crucial step in data protection to ensure user security and personal data privacy. In this sense, many companies have started to control and restrict access to their data using authentication systems. However, these traditional authentication methods, are not enough for ensuring data protection, and for this reason, behavioral biometrics have gained importance. Despite their promising results and the wide range of applications, biometric systems have shown to be vulnerable to malicious attacks, such as Presentation Attacks. For this reason, in this work, we propose to study a new approach aiming to deploy a presentation attack towards a keystroke authentication system. Our idea is to use Conditional Generative Adversarial Networks (cGAN) for generating synthetic keystroke data that can be used for impersonating an authorized user. These synthetic data are generated following two different real use cases, one in which the order of the typed words is known (ordered dynamic) and the other in which this order is unknown (no-ordered dynamic). Finally, both keystroke dynamics (ordered and no-ordered) are validated using an external keystroke authentication system. Results indicate that the cGAN can effectively generate keystroke dynamics patterns that can be used for deceiving keystroke authentication systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/29/2017

Synthetic Iris Presentation Attack using iDCGAN

Reliability and accuracy of iris biometric modality has prompted its lar...
research
10/31/2022

Synthetic ID Card Image Generation for Improving Presentation Attack Detection

Currently, it is ever more common to access online services for activiti...
research
03/08/2019

RoPAD: Robust Presentation Attack Detection through Unsupervised Adversarial Invariance

For enterprise, personal and societal applications, there is now an incr...
research
06/15/2021

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

Previous studies have demonstrated that commonly studied (vanilla) touch...
research
07/27/2020

Swipe dynamics as a means of authentication: results from a Bayesian unsupervised approach

The field of behavioural biometrics stands as an appealing alternative t...
research
06/09/2023

GAN-CAN: A Novel Attack to Behavior-Based Driver Authentication Systems

For many years, car keys have been the sole mean of authentication in ve...
research
10/02/2022

GANTouch: An Attack-Resilient Framework for Touch-based Continuous Authentication System

Previous studies have shown that commonly studied (vanilla) implementati...

Please sign up or login with your details

Forgot password? Click here to reset