Cluster Computing

, Volume 22, Supplement 4, pp 9677–9685 | Cite as

A novel approach to classify users based on keystroke behavior

  • J. LeelavathyEmail author
  • S. Selvabrundha


The contemporary society has been posing several security threats with evolution of modern devices. Keystroke dynamics is a behavioral biometrics that can be bolstered with the existing traditional password typing to validate the identity of the user. In the previous research a three dimensional model was constructed based on dwell time, pressure and tolerance. This paper extends the previous research focusing to improve the classification accuracy. It makes use of an unsupervised technique called self-organizing maps to cluster the data from a three dimensional space to a two dimensional space followed by a learning vector quantization algorithm to classify the user and learn from the feedback obtained. It provides simple but efficient stochastic learning to improve classification accuracy. Results show that the proposed approach leverages existing techniques with higher precision in identifying the user.


Self-organizing maps (SOFM) Learning vector quantization (LVQ) Classification Authentication 


  1. 1.
    Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Sec. 8(1), 136–148 (2013)CrossRefGoogle Scholar
  2. 2.
    Bishop, M.: Computer Security. Addison-Wesley, Boston (2003)Google Scholar
  3. 3.
    Bai, G., Sun, B.: A survey of user classification in social networks. In: 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 1–10 (2015)Google Scholar
  4. 4.
    Kulshreshtha, D., et al.: Content-based mammogram retrieval using k-means clustering and local binary pattern. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC). IEEE (2017)Google Scholar
  5. 5.
    Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Park, J.J., et al. (eds.) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol. 301. Springer, Dordrecht (2014)Google Scholar
  6. 6.
    Guha, S., Mishra, N.: Clustering data streams. In: Garofalakis, C. (ed.) Data Stream Management, pp. 169–187. Springer, Berlin (2016)CrossRefGoogle Scholar
  7. 7.
    Jiang, X.-L., et al.: Robust level set image segmentation algorithm using local correntropy-based fuzzy c-means clustering with spatial constraints. Int. J. Neurocomput. 207, 22–35 (2016)CrossRefGoogle Scholar
  8. 8.
    Zhang, S., Wang, H., Huang, W.: Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. J. Clust. Comput. (2017)
  9. 9.
    Bakshi, S., Sa, P.K., Wang, H., Barpanda, S.S., Majhi, B.: Fast periocular authentication in handheld devices with reduced phase intensive local pattern. J. Multimed. Tools Appl. (2017)
  10. 10.
    Murugesan, C., Senthil Kumar, T., Priyanka, U.S., Abinaya, K.: Towards an approach for improved security in wireless networks. Int. J. Comput. Appl. 1, 9–13 (2013)Google Scholar
  11. 11.
    Adeoye, O.S.: A survey of emerging biometric technologies. Int. J. Comput. Appl. (2010)
  12. 12.
    Demirhan, A., Güler, I.: Combining stationary wavelet transform and self-organizing maps for brain MR image segmentation. Eng. Appl. Artif. Intell. 24(2), 358–367 (2011)CrossRefGoogle Scholar
  13. 13.
    Powers, S.T., He, J.: A hybrid artificial immune system and self organising map for network intrusion detection. arXiv preprint arXiv:1208.0541 (2012)
  14. 14.
    Ding, S., Heng Chang, X., Hui Wu, Q.: Pattern classification based on self-organizing feature mapping neural network. Appl. Mech. Mater. 448, 3645–3649 (2014)Google Scholar
  15. 15.
    Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003)Google Scholar
  16. 16.
    Srivastava, A., Geethakumari, G.: Measuring privacy leaks in online social networks. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095–2100 (2013)Google Scholar
  17. 17.
    Wang, H., Wang, J.: November. An effective image representation method using kernel classification. In: International Conference on Tools with Artificial Intelligence, pp. 853–858 (2014)Google Scholar
  18. 18.
    Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(2) (2007)Google Scholar
  19. 19.
    Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 47–54 (2013)CrossRefGoogle Scholar
  20. 20.
    Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80 (2005)Google Scholar
  21. 21.
    Kumar, S.T., Priyanka, U.S., Abinaya, K.: Towards an Approach for Improved Security in Wireless Networks. In: IJCA Proceedings on International Conference on Innovation in Communication, Information and Computing 2013 ICICIC 2013 vol. 1, pp 23–27, March 2013. Published by Foundation of Computer Science, New York (2013)Google Scholar
  22. 22.
    Mehrotra, K., Mohan, C.K., Ranka, S.: Elements of Artificial Neural Networks. MIT Press, Cambridge (1997)zbMATHGoogle Scholar
  23. 23.
    Visa, A., Valkealahti, K., Iivarinen, J., Simula, O.: Experiences from Operational Cloud Classifier Based on Self-organizing Map. In Proceedings of SPIE, Orlando, Florida, Applications of Artificial Neural Networks Vol. 2243, pp. 484–495 (1994)Google Scholar
  24. 24.
    Priyono, A., Ridwan, M., Alias, A.J., Rahmat, R., Hassan, A., Ali, M.: Application of LVQ neural network in real-time adaptive traffic signal control. J. Teknol. 42(B), 29–44 (2005)Google Scholar
  25. 25.
    Kuroda, M.C., Carvalho, A.M., Vidal, A.C.: Classification of well using SOM and LVQ. In: 73rd EAGE Conference & Exhibition (2011)Google Scholar
  26. 26.
    Lovato, P., et al.: Faved! biometrics: tell me which image you like and I’ll tell you who you are. IEEE Trans. Inf. Forensics Sec. 9(3), 364–374 (2014)CrossRefGoogle Scholar
  27. 27.
    Yoon, H.-J., Carmichael, T.R., Tourassi, G.: Gaze as a biometric. In: SPIE Medical Imaging. International Society for Optics and Photonics (2014)Google Scholar
  28. 28.
    Gunasekar, S., Ghosh, J., Bovik, A.C.: Face detection on distorted images using perceptual quality-aware features. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2014)Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2017

Authors and Affiliations

  1. 1.Bharathiar UniversityCoimbatoreIndia
  2. 2.Cheran College of EngineeringKarurIndia

Personalised recommendations