Skip to main content

Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection

  • Conference paper
  • First Online:
Proceedings of Eighth International Congress on Information and Communication Technology (ICICT 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 693))

Included in the following conference series:

  • 428 Accesses

Abstract

Recently, behavioral biometric-based user authentication methods, such as keystroke dynamics, have become a popular alternative to improve security of online platforms, due to their non-invasive nature. However, currently there are very few behavioral biometric authentication methods that provide non-invasive continuous user authentication for online education platforms, resulting in frequent network intrusion and online assessment fraud. Existing approaches mostly analyze the typing behavior of users using a fixed sequence of characters. Furthermore, a better set of features are required to reduce false positive rate for satisfactory performance to prevent online fraud. Existing behavioral analysis methods also mostly rely on conventional machine learning approaches despite recent advancement in deep learning approaches. We identify a set of keystroke behavioral biometric features that yield satisfactory performance by identifying most frequently used features. We also collect new free-form keystroke behavior data during online assessment activities and develop non-invasive continuous authentication methods for free-form text behavior analysis using deep learning approaches. We also compare performance between deep learning and conventional machine learning approaches and evaluate the robustness of the most frequently used features. Result analysis shows that deep learning approaches outperform machine learning approaches on most frequently used feature set. Furthermore, it is found that the identified feature set is robust and results in satisfactory performance in deep learning approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kochegurova EA, Martynova YA (2020) Aspects of continuous user identification based on free texts and hidden monitoring. Program Comput Softw 46(1):12–24. https://doi.org/10.1134/S036176882001003X

    Article  Google Scholar 

  2. Andrean A, Jayabalan M, Thiruchelvam V (2020) Keystroke dynamics based user authentication using deep multilayer perceptron. Int J Mach Learn Comput 10(1):134–139

    Article  Google Scholar 

  3. Jain AK, Ross A, Pankanti S (2006) Biometrics: a tool for information security. IEEE Trans Inf Forensics Secur 1(2):125–143. https://doi.org/10.1109/TIFS.2006.873653

    Article  Google Scholar 

  4. Subash A, Song I (2021) Real-time behavioral biometric information security system for assessment fraud detection. In: 2021 IEEE international conference on computing (ICOCO), pp 186–191. https://doi.org/10.1109/ICOCO53166.2021.9673568

  5. Sadikan SFN, Ramli AA, Fudzee MFM (2019) A survey paper on keystroke dynamics authentication for current applications. AIP Conf Proc 2173(1). https://doi.org/10.1063/1.5133925

  6. Tsimperidis I, Rostami S, Katos V (2017) Age detection through keystroke dynamics from user authentication failures. Int J Digital Crime Forensics (IJDCF) 9(1):1–16

    Article  Google Scholar 

  7. Tsimperidis I, Arampatzis A, Karakos A (2018) Keystroke dynamics features for gender recognition. Digit Investig 24:4–10. https://doi.org/10.1016/j.diin.2018.01.018

    Article  Google Scholar 

  8. Tsimperidis I et al (2020). R 2 BN: an adaptive model for keystroke-dynamics-based educational level classification. IEEE Trans Cybern 50(2)525

    Google Scholar 

  9. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: 2009 IEEE/IFIP international conference on dependable systems & networks, pp 125–134. https://doi.org/10.1109/DSN.2009.5270346

  10. Wu T et al (2019) User identification by keystroke dynamics using improved binary particle swarm optimization. Int J Bio-Inspired Comput 14(3):171. https://doi.org/10.1504/ijbic.2019.103613

    Article  Google Scholar 

  11. Ayotte B et al (2020) Fast free-text authentication via instance-based keystroke dynamics. IEEE Trans Biometrics, Behavior, Identity Sci 2(4):377–387. https://doi.org/10.1109/TBIOM.2020.3003988

    Article  Google Scholar 

  12. Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397. https://doi.org/10.1145/581271.581272

    Article  Google Scholar 

  13. Epp C, Lippold M, Mandryk RL (2011) Identifying emotional states using keystroke dynamics. In: Proceedings of the SIGCHI conference on human factors in computing systems, pp 715–724. https://doi.org/10.1145/1978942.1979046

  14. Bours (2012) Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf Secur Tech Report 17(1–2):36–43. https://doi.org/10.1016/j.istr.2012.02.001

  15. Wu C et al (2018) Keystroke dynamics enabled authentication and identification using triboelectric nanogenerator array. Materials Today (Kidlington, England) 21(3):216–222. https://doi.org/10.1016/j.mattod.2018.01.006

    Article  Google Scholar 

  16. Maalej A, Kallel I (2020) Does keystroke dynamics tell us about emotions? A systematic literature review and dataset construction. In: 2020 16th international conference on intelligent environments (IE). IEEE, pp 60–67. https://doi.org/10.1109/IE49459.2020.9155004

  17. Maheshwary S, Ganguly S, Pudi V (2017) Deep secure: a fast and simple neural network based approach for user authentication and identification via keystroke dynamics. In: IWAISe: first international workshop on artificial intelligence in security, vol 59

    Google Scholar 

  18. Ceker H, Upadhyaya S (2016) Adaptive techniques for intra-user variability in keystroke dynamics. In: 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp 1–6. https://doi.org/10.1109/BTAS.2016.7791156

  19. Buker RG, Vinciarelli A, Cambria E (2019) Type like a man! inferring gender from keystroke dynamics in live-chats. IEEE Intell Syst 34(6):53–59. https://doi.org/10.1109/MIS.2019.2948514

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aditya Subash .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subash, A., Song, I., Tao, K. (2023). Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Yang, XS., Sherratt, R.S., Dey, N., Joshi, A. (eds) Proceedings of Eighth International Congress on Information and Communication Technology. ICICT 2023. Lecture Notes in Networks and Systems, vol 693. Springer, Singapore. https://doi.org/10.1007/978-981-99-3243-6_71

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-3243-6_71

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-3242-9

  • Online ISBN: 978-981-99-3243-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics