Obfuscating Keystroke Time Intervals to Avoid Identification and Impersonation
نویسندگان
چکیده
There are numerous opportunities for adversaries to observe user behavior remotely on the web. Additionally, keystroke biometric algorithms have advanced to the point where user identification and soft biometric trait recognition rates are commercially viable. This presents a privacy concern because masking spatial information, such as IP address, is not sufficient as users become more identifiable by their behavior. In this work, the well-known Chaum mix is generalized to a scenario in which users are separated by both space and time with the goal of preventing an observing adversary from identifying or impersonating the user. The criteria of a behavior obfuscation strategy are defined and two strategies are introduced for obfuscating typing behavior. Experimental results are obtained using publicly available keystroke data for three different types of input, including short fixed-text, long fixed-text, and long free-text. Identification accuracy is reduced by 20% with a 25 ms random keystroke delay not noticeable to the user.
منابع مشابه
An Augmented Computer User Login Authentication Using Classifying Regions of Keystroke Density Neural Network Government Sponsorship
We develop a system consisting of a neural architecture resulting in classifying regions corresponding to users’ keystroke patterns. We extend the adaptation properties to classification phase resulting in learning of changes over time. Classification results on login attempts of 43 users (216 valid, 657 impersonation samples) show considerable improvements over existing methods. PST-15418/36 4...
متن کاملRobustness of keystroke-dynamics based biometrics against synthetic forgeries
Biometric systems including keystroke-dynamics based authentication have been well studied in the literature. The attack model in biometrics typically considers impersonation attempts launched by human imposters. However, this attack model is not adequate, as advanced attackers may utilize programs to forge data. In this paper, we consider the effects of synthetic forgery attacks in the context...
متن کاملOn the equalization of keystroke timing histograms
The effect of parametric equalization of time interval histograms (key down–down intervals) on the performance of keystroke-based user verification algorithms is analyzed. Three algorithms are used throughout this analysis: a classic one for static (structured) texts, a second one, also proposed in literature, for both static and arbitrary (free) text, and a new one for arbitrary text based ver...
متن کاملKeystroke Biometric Identification and Authentication on Long-Text Input
A novel keystroke biometric system for long-text input was developed and evaluated for user identification and authentication applications. The system consists of a Java applet to collect raw keystroke data over the internet, a feature extractor, and pattern classifiers to make identification or authentication decisions. Experiments on over 100 subjects investigated two input modes – copy and f...
متن کاملThe Partially Observable Hidden Markov Model with Application to Keystroke Biometrics
The partially observable hidden Markov model is an extension of the hidden Markov Model in which the hidden state is conditioned on an independent Markov chain. This structure is motivated by the presence of discrete metadata, such as an event type, that may partially reveal the hidden state, but itself emanates from a separate process. Such a scenario is encountered in keystroke dynamics where...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1609.07612 شماره
صفحات -
تاریخ انتشار 2016