Abstract
The contemporary society has been posing several security threats with evolution of modern devices. Keystroke dynamics is a behavioral biometrics that can be bolstered with the existing traditional password typing to validate the identity of the user. In the previous research a three dimensional model was constructed based on dwell time, pressure and tolerance. This paper extends the previous research focusing to improve the classification accuracy. It makes use of an unsupervised technique called self-organizing maps to cluster the data from a three dimensional space to a two dimensional space followed by a learning vector quantization algorithm to classify the user and learn from the feedback obtained. It provides simple but efficient stochastic learning to improve classification accuracy. Results show that the proposed approach leverages existing techniques with higher precision in identifying the user.
Similar content being viewed by others
References
Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Sec. 8(1), 136–148 (2013)
Bishop, M.: Computer Security. Addison-Wesley, Boston (2003)
Bai, G., Sun, B.: A survey of user classification in social networks. In: 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 1–10 (2015)
Kulshreshtha, D., et al.: Content-based mammogram retrieval using k-means clustering and local binary pattern. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC). IEEE (2017)
Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Park, J.J., et al. (eds.) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol. 301. Springer, Dordrecht (2014)
Guha, S., Mishra, N.: Clustering data streams. In: Garofalakis, C. (ed.) Data Stream Management, pp. 169–187. Springer, Berlin (2016)
Jiang, X.-L., et al.: Robust level set image segmentation algorithm using local correntropy-based fuzzy c-means clustering with spatial constraints. Int. J. Neurocomput. 207, 22–35 (2016)
Zhang, S., Wang, H., Huang, W.: Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. J. Clust. Comput. https://doi.org/10.1007/s10586-017-0859-7 (2017)
Bakshi, S., Sa, P.K., Wang, H., Barpanda, S.S., Majhi, B.: Fast periocular authentication in handheld devices with reduced phase intensive local pattern. J. Multimed. Tools Appl. https://doi.org/10.1007/s11042-017-4965-6 (2017)
Murugesan, C., Senthil Kumar, T., Priyanka, U.S., Abinaya, K.: Towards an approach for improved security in wireless networks. Int. J. Comput. Appl. 1, 9–13 (2013)
Adeoye, O.S.: A survey of emerging biometric technologies. Int. J. Comput. Appl. https://doi.org/10.5120/1424-1659 (2010)
Demirhan, A., Güler, I.: Combining stationary wavelet transform and self-organizing maps for brain MR image segmentation. Eng. Appl. Artif. Intell. 24(2), 358–367 (2011)
Powers, S.T., He, J.: A hybrid artificial immune system and self organising map for network intrusion detection. arXiv preprint arXiv:1208.0541 (2012)
Ding, S., Heng Chang, X., Hui Wu, Q.: Pattern classification based on self-organizing feature mapping neural network. Appl. Mech. Mater. 448, 3645–3649 (2014)
Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003)
Srivastava, A., Geethakumari, G.: Measuring privacy leaks in online social networks. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095–2100 (2013)
Wang, H., Wang, J.: November. An effective image representation method using kernel classification. In: International Conference on Tools with Artificial Intelligence, pp. 853–858 (2014)
Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(2) (2007)
Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 47–54 (2013)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80 (2005)
Kumar, S.T., Priyanka, U.S., Abinaya, K.: Towards an Approach for Improved Security in Wireless Networks. In: IJCA Proceedings on International Conference on Innovation in Communication, Information and Computing 2013 ICICIC 2013 vol. 1, pp 23–27, March 2013. Published by Foundation of Computer Science, New York (2013)
Mehrotra, K., Mohan, C.K., Ranka, S.: Elements of Artificial Neural Networks. MIT Press, Cambridge (1997)
Visa, A., Valkealahti, K., Iivarinen, J., Simula, O.: Experiences from Operational Cloud Classifier Based on Self-organizing Map. In Proceedings of SPIE, Orlando, Florida, Applications of Artificial Neural Networks Vol. 2243, pp. 484–495 (1994)
Priyono, A., Ridwan, M., Alias, A.J., Rahmat, R., Hassan, A., Ali, M.: Application of LVQ neural network in real-time adaptive traffic signal control. J. Teknol. 42(B), 29–44 (2005)
Kuroda, M.C., Carvalho, A.M., Vidal, A.C.: Classification of well using SOM and LVQ. In: 73rd EAGE Conference & Exhibition (2011)
Lovato, P., et al.: Faved! biometrics: tell me which image you like and I’ll tell you who you are. IEEE Trans. Inf. Forensics Sec. 9(3), 364–374 (2014)
Yoon, H.-J., Carmichael, T.R., Tourassi, G.: Gaze as a biometric. In: SPIE Medical Imaging. International Society for Optics and Photonics (2014)
Gunasekar, S., Ghosh, J., Bovik, A.C.: Face detection on distorted images using perceptual quality-aware features. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2014)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Leelavathy, J., Selvabrundha, S. A novel approach to classify users based on keystroke behavior. Cluster Comput 22 (Suppl 4), 9677–9685 (2019). https://doi.org/10.1007/s10586-017-1341-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1341-2