Abstract
Recently, behavioral biometric-based user authentication methods, such as keystroke dynamics, have become a popular alternative to improve security of online platforms, due to their non-invasive nature. However, currently there are very few behavioral biometric authentication methods that provide non-invasive continuous user authentication for online education platforms, resulting in frequent network intrusion and online assessment fraud. Existing approaches mostly analyze the typing behavior of users using a fixed sequence of characters. Furthermore, a better set of features are required to reduce false positive rate for satisfactory performance to prevent online fraud. Existing behavioral analysis methods also mostly rely on conventional machine learning approaches despite recent advancement in deep learning approaches. We identify a set of keystroke behavioral biometric features that yield satisfactory performance by identifying most frequently used features. We also collect new free-form keystroke behavior data during online assessment activities and develop non-invasive continuous authentication methods for free-form text behavior analysis using deep learning approaches. We also compare performance between deep learning and conventional machine learning approaches and evaluate the robustness of the most frequently used features. Result analysis shows that deep learning approaches outperform machine learning approaches on most frequently used feature set. Furthermore, it is found that the identified feature set is robust and results in satisfactory performance in deep learning approaches.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kochegurova EA, Martynova YA (2020) Aspects of continuous user identification based on free texts and hidden monitoring. Program Comput Softw 46(1):12–24. https://doi.org/10.1134/S036176882001003X
Andrean A, Jayabalan M, Thiruchelvam V (2020) Keystroke dynamics based user authentication using deep multilayer perceptron. Int J Mach Learn Comput 10(1):134–139
Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inf Forensics Secur 1(2):125–143. https://doi.org/10.1109/TIFS.2006.873653
Subash A, Song I (2021) Real-time behavioral biometric information security system for assessment fraud detection. In: 2021 IEEE international conference on computing (ICOCO), pp 186–191. https://doi.org/10.1109/ICOCO53166.2021.9673568
Sadikan SFN, Ramli AA, Fudzee MFM (2019) A survey paper on keystroke dynamics authentication for current applications. AIP Conf Proc 2173(1). https://doi.org/10.1063/1.5133925
Tsimperidis I, Rostami S, Katos V (2017) Age detection through keystroke dynamics from user authentication failures. Int J Digital Crime Forensics (IJDCF) 9(1):1–16
Tsimperidis I, Arampatzis A, Karakos A (2018) Keystroke dynamics features for gender recognition. Digit Investig 24:4–10. https://doi.org/10.1016/j.diin.2018.01.018
Tsimperidis I et al (2020). R 2 BN: an adaptive model for keystroke-dynamics-based educational level classification. IEEE Trans Cybern 50(2)525
Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP international conference on dependable systems & networks, pp 125–134. https://doi.org/10.1109/DSN.2009.5270346
Wu T et al (2019) User identification by keystroke dynamics using improved binary particle swarm optimization. Int J Bio-Inspired Comput 14(3):171. https://doi.org/10.1504/ijbic.2019.103613
Ayotte B et al (2020) Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans Biometrics, Behavior, Identity Sci 2(4):377–387. https://doi.org/10.1109/TBIOM.2020.3003988
Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397. https://doi.org/10.1145/581271.581272
Epp C, Lippold M, Mandryk RL (2011) Identifying emotional states using keystroke dynamics. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 715–724. https://doi.org/10.1145/1978942.1979046
Bours (2012) Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf Secur Tech Report 17(1–2):36–43. https://doi.org/10.1016/j.istr.2012.02.001
Wu C et al (2018) Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array. Materials Today (Kidlington, England) 21(3):216–222. https://doi.org/10.1016/j.mattod.2018.01.006
Maalej A, Kallel I (2020) Does keystroke dynamics tell us about emotions? A systematic literature review and dataset construction. In: 2020 16th international conference on intelligent environments (IE). IEEE, pp 60–67. https://doi.org/10.1109/IE49459.2020.9155004
Maheshwary S, Ganguly S, Pudi V (2017) Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics. In: IWAISe: first international workshop on artificial intelligence in security, vol 59
Ceker H, Upadhyaya S (2016) Adaptive techniques for intra-user variability in keystroke dynamics. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–6. https://doi.org/10.1109/BTAS.2016.7791156
Buker RG, Vinciarelli A, Cambria E (2019) Type like a man! inferring gender from keystroke dynamics in live-chats. IEEE Intell Syst 34(6):53–59. https://doi.org/10.1109/MIS.2019.2948514
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Subash, A., Song, I., Tao, K. (2023). Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Yang, XS., Sherratt, R.S., Dey, N., Joshi, A. (eds) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol 693. Springer, Singapore. https://doi.org/10.1007/978-981-99-3243-6_71
Download citation
DOI: https://doi.org/10.1007/978-981-99-3243-6_71
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3242-9
Online ISBN: 978-981-99-3243-6
eBook Packages: EngineeringEngineering (R0)