Retraining a Novelty Detector with Impostor Patterns for Keystroke Dynamics-Based Authentication

نویسندگان

  • Hyoungjoo Lee
  • Sungzoon Cho
چکیده

In keystroke dynamics-based authentication, novelty detection methods have been used since only the valid user’s patterns are available when a classifier is built. After a while, however, impostors’ keystroke patterns become also available from failed login attempts. We propose to retrain the novelty detector with the impostor patterns to enhance the performance. In this paper the support vector data description (SVDD) and the one-class learning vector quantization (1-LVQ) are retrained with the impostor patterns. Experiments on 21 keystroke pattern datasets show that the performance improves after retraining and that the one-class learning vector quantization outperforms other widely used novelty detectors.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Continuous Authentication with Keystroke Dynamics

In this chapter we will discuss how keystroke dynamics can be used for true continuous authentication.We have collected keystroke dynamics data of 53 participants who used the computer freely and we have analysed the collected data. We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the ...

متن کامل

An Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity

This paper presents an anomaly detector for keystroke dynamics authentication, based on a statistical measure of proximity, evaluated through the empirical study of an independent benchmark of keystroke data. A password typing-rhythm classifier is presented, to be used as an anomaly detector in the authentication process of genuine users and impostors. The proposed user authentication method in...

متن کامل

A Study of Keystroke Dynamics as a Practical Form of Authentication

This project tested four keystroke analysis strategies and their effectiveness for a practical implementation of keystroke dynamics. A web based keystroke analysis system was implemented and a total of 70 participants were involved with the experiment. We designed a new method of typing data storage that is less storage intensive than previous studies. Error rates for each analysis was graphed ...

متن کامل

Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates

A major challenge in anomaly-detection studies lies in identifying the myriad factors that influence error rates. In keystroke dynamics, where detectors distinguish the typing rhythms of genuine users and impostors, influential factors may include the algorithm itself, amount of training, choice of features, use of updating, impostor practice, and typist-to-typist variation. In this work, we co...

متن کامل

Neural Network Based Authentication and Verification for Web Based Key Stroke Dynamics

Web based authentication provide remote authentication and security control mechanism. Password typing is the most widely used identity verification method in World Wide Web based Electronic Commerce (EC). Due to its simplicity, it is vulnerable to imposter attacks. Keystroke dynamics and password checking can be combined to result in a more secure verification system. We proposed an associatio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006