Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network

نویسندگان

  • Yunbin Deng
  • Yu Zhong
چکیده

Recent popularity in mobile devices has raised concerns on mobile technology security, as not only sensitive and private data are being stored on mobile devices, but also allowing remote access to other high value assets. This drives research efforts to new mobile technology security methods. Fortunately, new mobile devices are equipped with advanced sensor suite, enabling a multi-modal biometrics authentication solution, to include voice, face, gait, signature, and keystroke authentication, among others. Compared with other modalities, keystroke authentication offer some very attractive features: 1) non-intrusive, either password or free-text typing keystroke authentication can be applied without affecting users’ daily user of the device; 2) it can work on continuous authentication mode for free typing; 3) it can leverage a unique set of advanced build in sensors, including accelerometer and gyroscope to capture rich typing information than raw timing pattern. We present a deep learning approach

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of behavioral authentication using keystroke dynamics: Touch screens and mobile devices

Nowadays most systems became computerized and use internet for remote access, including systems which have critical and sensitive data such as banks and governmental institutions. This led to the huge need for a reliable and efficient authentication system to secure data. User authentication is mostly done using passwords. But it is not a sufficient way to use just a password since it has many ...

متن کامل

Deep-Spying: Spying using Smartwatch and Deep Learning

Wearable technologies are today on the rise, becoming more common and broadly available to mainstream users. In fact, wristband and armband devices such as smartwatches and fitness trackers already took an important place in the consumer electronics market and are becoming ubiquitous. By their very nature of being wearable, these devices, however, provide a new pervasive attack surface threaten...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Proposing A Distributed Model For Intrusion Detection In Mobile Ad-Hoc Network Using Neural Fuzzy Interface

Security term in mobile ad hoc networks has several aspects because of the special specification of these networks. In this paper a distributed architecture was proposed in which each node performed intrusion detection based on its own and its neighbors’ data. Fuzzy-neural interface was used that is the composition of learning ability of neural network and fuzzy Ratiocination of fuzzy system as...

متن کامل

Keystroke dynamics on a mobile handset: a feasibility study

With the introduction of third generation phones, a technological transition is occurring in which the devices begin to have similar functionality to that of current personal digital assistants. The ability of these phones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. Current security for mobile p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015