Retraining a Novelty Detector with Impostor Patterns for Keystroke Dynamics-Based Authentication
نویسندگان
چکیده
In keystroke dynamics-based authentication, novelty detection methods have been used since only the valid user’s patterns are available when a classifier is built. After a while, however, impostors’ keystroke patterns become also available from failed login attempts. We propose to retrain the novelty detector with the impostor patterns to enhance the performance. In this paper the support vector data description (SVDD) and the one-class learning vector quantization (1-LVQ) are retrained with the impostor patterns. Experiments on 21 keystroke pattern datasets show that the performance improves after retraining and that the one-class learning vector quantization outperforms other widely used novelty detectors.
منابع مشابه
Continuous Authentication with Keystroke Dynamics
In this chapter we will discuss how keystroke dynamics can be used for true continuous authentication.We have collected keystroke dynamics data of 53 participants who used the computer freely and we have analysed the collected data. We will describe a system that decides on the genuineness of the user based on each and every single keystroke action of the current user and we will represent the ...
متن کاملAn Anomaly Detector for Keystroke Dynamics Based on Medians Vector Proximity
This paper presents an anomaly detector for keystroke dynamics authentication, based on a statistical measure of proximity, evaluated through the empirical study of an independent benchmark of keystroke data. A password typing-rhythm classifier is presented, to be used as an anomaly detector in the authentication process of genuine users and impostors. The proposed user authentication method in...
متن کاملA Study of Keystroke Dynamics as a Practical Form of Authentication
This project tested four keystroke analysis strategies and their effectiveness for a practical implementation of keystroke dynamics. A web based keystroke analysis system was implemented and a total of 70 participants were involved with the experiment. We designed a new method of typing data storage that is less storage intensive than previous studies. Error rates for each analysis was graphed ...
متن کاملWhy Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates
A major challenge in anomaly-detection studies lies in identifying the myriad factors that influence error rates. In keystroke dynamics, where detectors distinguish the typing rhythms of genuine users and impostors, influential factors may include the algorithm itself, amount of training, choice of features, use of updating, impostor practice, and typist-to-typist variation. In this work, we co...
متن کاملNeural Network Based Authentication and Verification for Web Based Key Stroke Dynamics
Web based authentication provide remote authentication and security control mechanism. Password typing is the most widely used identity verification method in World Wide Web based Electronic Commerce (EC). Due to its simplicity, it is vulnerable to imposter attacks. Keystroke dynamics and password checking can be combined to result in a more secure verification system. We proposed an associatio...
متن کامل