Abstract
The article addresses the issues of behavioral biometrics. Presented research concerns an analysis of a user activity related to a keyboard use in a computer system. A method of computer user profiling based on encrypted keystrokes is introduced to ensure a high level of users data protection. User’s continuous work in a computer system is analyzed. This type of analysis constitutes a type of free-text analysis. Additionally, an attempt to user verification in order to detect intruders is performed. Intrusion detection is based on a modified k-NN classifier and different distance measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Alsultan, A., Warwick, K.: Keystroke Dynamics Authentication: A Survey of Free-text Methods. J. of Computer Science Issues 10(4), 1–10 (2013). No. 1
Araujo, L.C.F., Sucupira Jr, L.H.R., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T.: User Authentication Through Typing Biometrics Features. IEEE Transactions on Signal Processing 53(2), 851–855 (2005)
Banerjee, S.P., Woodard, D.L.: Biometric Authentication and Identification Using Keystroke Dynamics: A survey. J. of Pattern Recognition Research 7, 116–139 (2012)
Dowland, P.S., Singh, H., Furnell, S.M.: A preliminary investigation of user authentication using continuous keystroke analysis. In: The 8th Annual Working Conference on Information Security Management and Small Systems Security (2001)
Filho, J.R.M., Freire, E.O.: On the Equalization of Keystroke Timing Histogram. Pattern Recognition Letters 27(13), 1440–1446 (2006)
Foster, K.R., Koprowski, R., Skufca, J.D.: Machine learning, medical diagnosis, and biomedical engineering research - commentary. Biomedical Engineering Online 13, Article No. 94 (2014). doi:10.1186/1475-925X-13-94
Gunetti, D., Picardi, C., Ruffo, G.: Keystroke analysis of different languages: a case study. In: Famili, A.F., Kok, J.N., Peña, J.M., Siebes, A., Feelders, A. (eds.) IDA 2005. LNCS, vol. 3646, pp. 133–144. Springer, Heidelberg (2005)
Hu, J., Gingrich, D., Sentosa, A.: A k-nearest neighbor approach for user authentication through biometric keystroke dynamics. In: IEEE International Conference on Communications, pp. 1556–1560 (2008)
Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: International Conference on Dependable Systems & Networks (DSN 2009), pp. 125–134. IEEE Computer Society Press (2009)
Krawczyk, K., Woźniak, M., Cyganek, B.: Clustering-based ensembles for one-class classification. Information Sciences 264, 182–195 (2014)
Kudłacik, P., Porwik, P.: A new approach to signature recognition using the fuzzy method. Pattern Analysis & Applications 17(3), 451–463 (2014). doi:10.1007/s10044-012-0283-9
Kudłacik, P., Porwik, P., Wesołowski, T.: Fuzzy Approach for Intrusion Detection Based on User’s Commands. Soft Computing. Springer-Verlag, Heidelberg (2015). doi:10.1007/s00500-015-1669-6
Lopatka, M., Peetz, M.: Vibration sensitive keystroke analysis. In: Proc. of The 18th Annual Belgian-Dutch Conference on Machine Learning, pp. 75–80 (2009)
Płys, M., Doroz, R., Porwik, P.: On-line signature recognition based on an analysis of dynamic feature. In: IEEE International Conference on Biometrics and Kansei Engineering, pp. 103–107. Tokyo Metropolitan University Akihabara (2013)
Teh, P.S., Teoh, A.B.J., Yue, S.: A Survey of Keystroke Dynamics Biometrics. The Scientific World Journal 2013, Article ID 408280, 24 (2013) . doi:10.1155/2013/408280
Porwik, P., Doroz, R., Orczyk, T.: The k-NN classifier and self-adaptive Hotelling data reduction technique in handwritten signatures recognition. Pattern Analysis and Applications. doi:10.1007/s10044-014-0419-1
Raiyn, J.: A survey of cyber attack detection strategies. International J. of Security and Its Applications 8(1), 247–256 (2014)
Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Advances in Information Security, vol. 39, pp. 69–90. Springer, US (2008)
Tappert, C.C., Villiani, M., Cha, S.: Keystroke biometric identification and authentication on long-text input. In: Wang, L., Geng, X. (eds.) Behavioral Biometrics for Human Identification: Intelligent Applications, pp. 342–367 (2010). doi:10.4018/978-1-60566-725-6.ch016
Wesolowski, T., Palys, M., Kudlacik, P.: Computer user verification based on mouse activity analysis. In: Barbucha, D., Nguyen, N.T., Batubara, J. (eds.) New Trends in Intelligent Information and Database Systems. SCI, vol. 598, pp. 61–70. Springer, Heidelberg (2015)
Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 117–123 (2012). doi:10.1109/CVPRW.2012.6239225
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Wesołowski, T.E., Porwik, P. (2015). Keystroke Data Classification for Computer User Profiling and Verification. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_57
Download citation
DOI: https://doi.org/10.1007/978-3-319-24306-1_57
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24305-4
Online ISBN: 978-3-319-24306-1
eBook Packages: Computer ScienceComputer Science (R0)