Skip to main content
Log in

A novel approach to classify users based on keystroke behavior

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The contemporary society has been posing several security threats with evolution of modern devices. Keystroke dynamics is a behavioral biometrics that can be bolstered with the existing traditional password typing to validate the identity of the user. In the previous research a three dimensional model was constructed based on dwell time, pressure and tolerance. This paper extends the previous research focusing to improve the classification accuracy. It makes use of an unsupervised technique called self-organizing maps to cluster the data from a three dimensional space to a two dimensional space followed by a learning vector quantization algorithm to classify the user and learn from the feedback obtained. It provides simple but efficient stochastic learning to improve classification accuracy. Results show that the proposed approach leverages existing techniques with higher precision in identifying the user.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Frank, M., et al.: Touchalytics: on the applicability of touchscreen input as a behavioral biometric for continuous authentication. IEEE Trans. Inf. Forensics Sec. 8(1), 136–148 (2013)

    Article  Google Scholar 

  2. Bishop, M.: Computer Security. Addison-Wesley, Boston (2003)

    Google Scholar 

  3. Bai, G., Sun, B.: A survey of user classification in social networks. In: 6th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 1–10 (2015)

  4. Kulshreshtha, D., et al.: Content-based mammogram retrieval using k-means clustering and local binary pattern. In: 2017 2nd International Conference on Image, Vision and Computing (ICIVC). IEEE (2017)

  5. Senthil Kumar, T., Suresh, A., Karumathil, A.: Improvised classification model for cloud based authentication using keystroke dynamics. In: Park, J.J., et al. (eds.) Frontier and Innovation in Future Computing and Communications. Lecture Notes in Electrical Engineering, vol. 301. Springer, Dordrecht (2014)

    Google Scholar 

  6. Guha, S., Mishra, N.: Clustering data streams. In: Garofalakis, C. (ed.) Data Stream Management, pp. 169–187. Springer, Berlin (2016)

    Chapter  Google Scholar 

  7. Jiang, X.-L., et al.: Robust level set image segmentation algorithm using local correntropy-based fuzzy c-means clustering with spatial constraints. Int. J. Neurocomput. 207, 22–35 (2016)

    Article  Google Scholar 

  8. Zhang, S., Wang, H., Huang, W.: Two-stage plant species recognition by local mean clustering and weighted sparse representation classification. J. Clust. Comput. https://doi.org/10.1007/s10586-017-0859-7 (2017)

  9. Bakshi, S., Sa, P.K., Wang, H., Barpanda, S.S., Majhi, B.: Fast periocular authentication in handheld devices with reduced phase intensive local pattern. J. Multimed. Tools Appl. https://doi.org/10.1007/s11042-017-4965-6 (2017)

  10. Murugesan, C., Senthil Kumar, T., Priyanka, U.S., Abinaya, K.: Towards an approach for improved security in wireless networks. Int. J. Comput. Appl. 1, 9–13 (2013)

    Google Scholar 

  11. Adeoye, O.S.: A survey of emerging biometric technologies. Int. J. Comput. Appl. https://doi.org/10.5120/1424-1659 (2010)

  12. Demirhan, A., Güler, I.: Combining stationary wavelet transform and self-organizing maps for brain MR image segmentation. Eng. Appl. Artif. Intell. 24(2), 358–367 (2011)

    Article  Google Scholar 

  13. Powers, S.T., He, J.: A hybrid artificial immune system and self organising map for network intrusion detection. arXiv preprint arXiv:1208.0541 (2012)

  14. Ding, S., Heng Chang, X., Hui Wu, Q.: Pattern classification based on self-organizing feature mapping neural network. Appl. Mech. Mater. 448, 3645–3649 (2014)

    Google Scholar 

  15. Palen, L., Dourish, P.: Unpacking privacy for a networked world. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 129–136 (2003)

  16. Srivastava, A., Geethakumari, G.: Measuring privacy leaks in online social networks. In: International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095–2100 (2013)

  17. Wang, H., Wang, J.: November. An effective image representation method using kernel classification. In: International Conference on Tools with Artificial Intelligence, pp. 853–858 (2014)

  18. Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. Int. J. Comput. Sci. 2(2) (2007)

  19. Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Comput. Surv. (CSUR) 45(4), 47–54 (2013)

    Article  Google Scholar 

  20. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80 (2005)

  21. Kumar, S.T., Priyanka, U.S., Abinaya, K.: Towards an Approach for Improved Security in Wireless Networks. In: IJCA Proceedings on International Conference on Innovation in Communication, Information and Computing 2013 ICICIC 2013 vol. 1, pp 23–27, March 2013. Published by Foundation of Computer Science, New York (2013)

  22. Mehrotra, K., Mohan, C.K., Ranka, S.: Elements of Artificial Neural Networks. MIT Press, Cambridge (1997)

    MATH  Google Scholar 

  23. Visa, A., Valkealahti, K., Iivarinen, J., Simula, O.: Experiences from Operational Cloud Classifier Based on Self-organizing Map. In Proceedings of SPIE, Orlando, Florida, Applications of Artificial Neural Networks Vol. 2243, pp. 484–495 (1994)

  24. Priyono, A., Ridwan, M., Alias, A.J., Rahmat, R., Hassan, A., Ali, M.: Application of LVQ neural network in real-time adaptive traffic signal control. J. Teknol. 42(B), 29–44 (2005)

    Google Scholar 

  25. Kuroda, M.C., Carvalho, A.M., Vidal, A.C.: Classification of well using SOM and LVQ. In: 73rd EAGE Conference & Exhibition (2011)

  26. Lovato, P., et al.: Faved! biometrics: tell me which image you like and I’ll tell you who you are. IEEE Trans. Inf. Forensics Sec. 9(3), 364–374 (2014)

    Article  Google Scholar 

  27. Yoon, H.-J., Carmichael, T.R., Tourassi, G.: Gaze as a biometric. In: SPIE Medical Imaging. International Society for Optics and Photonics (2014)

  28. Gunasekar, S., Ghosh, J., Bovik, A.C.: Face detection on distorted images using perceptual quality-aware features. In: IS&T/SPIE Electronic Imaging. International Society for Optics and Photonics (2014)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to J. Leelavathy.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Leelavathy, J., Selvabrundha, S. A novel approach to classify users based on keystroke behavior. Cluster Comput 22 (Suppl 4), 9677–9685 (2019). https://doi.org/10.1007/s10586-017-1341-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1341-2

Keywords

Navigation