Title :
User Authentication Based on Representative Users
Author :
Schclar, Alon ; Rokach, Lior ; Abramson, Adi ; Elovici, Yuval
Author_Institution :
Sch. of Comput. Sci., Acad. Coll. of Tel-Aviv, Tel Aviv, Israel
Abstract :
User authentication based on username and password is the most common means to enforce access control. This form of access restriction is prone to hacking since stolen usernames and passwords can be exploited to impersonate legitimate users in order to commit malicious activity. Biometric authentication incorporates additional user characteristics such as the manner by which the keyboard is used in order to identify users. We introduce a novel approach for user authentication based on the keystroke dynamics of the password entry. A classifier is tailored to each user and the novelty lies in the manner by which the training set is constructed. Specifically, only the keystroke dynamics of a small subset of users, which we refer to as representatives, is used along with the password entry keystroke dynamics of the examined user. The contribution of this approach is twofold: it reduces the possibility of overfitting, while allowing scalability to a high volume of users. We propose two strategies to construct the subset for each user. The first selects the users whose keystroke profiles govern the profiles of all the users, while the second strategy chooses the users whose profiles are the most similar to the profile of the user for whom the classifier is constructed. Results are promising reaching in some cases 90% area under the curve. In many cases, a higher number of representatives deteriorate the accuracy which may imply overfitting. An extensive evaluation was performed using a dataset containing over 780 users.
Keywords :
authorisation; biometrics (access control); computer crime; access control; biometric authentication; hacking; malicious activity; password; representative users; user authentication; username; Authentication; Clustering algorithms; Computer hacking; Feature extraction; Keyboards; Training; Vectors; Behavioral biometric; computer security; keystrokes biometric; user authentication;
Journal_Title :
Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on
DOI :
10.1109/TSMCC.2012.2215850