Enhancing User Authentication via Deep Learning: A Keystroke Dynamics Approach

##plugins.themes.academic_pro.article.main##

Kartik N Iyer

Abstract

User authentication is an important process that ensures only authorized individuals can access a system or network infrastructure. This process protects users’ sensitive information from unauthorized access and prevents any unwanted tampering. In this research paper, a unique method for authenticating users based on typing dynamics has been proposed, aimed to enhance the security of systems and networks by verifying user identities. This method involves calculating the period of time each key is pressed and released. The study includes data collection, feature extraction, model training, and performance evaluation by measuring the accuracy and precision of the trained model. We evaluated three deep-learning models to test the proposed method and determine its accuracy, precision, and superiority among the three models. Based on the findings of this research, we are able to present an algorithm which outperforms the other two considered for the experiment. Also, a comparative study is been presented after the first evaluation which involves assessing the accuracies for different lengths of the password. Additionally, charts and graphs were carefully employed to ensure precise representation and effective visualization of the data.

##plugins.themes.academic_pro.article.details##

How to Cite
Iyer, K. N., Upadhyay, H. K., & Vaghela, R. S. . (2024). Enhancing User Authentication via Deep Learning: A Keystroke Dynamics Approach. International Journal of Next-Generation Computing, 15(2). https://doi.org/10.47164/ijngc.v15i2.1706

References

  1. AbdelRaouf, H., Chelloug, S. A., Muthanna, A., Semary, N., Amin, K., and Ibrahim, M. 2023. Efficient convolutional neural network-based keystroke dynamics for boosting user authentication. Sensors 23, 10. DOI: https://doi.org/10.3390/s23104898
  2. Alrawili, R., Alqahtani, A., and Khan, M. 2024. Comprehensive survey: Biometric user authentication application, evaluation, and discussion. Computers and Electrical Engineering 119, 109485. DOI: https://doi.org/10.1016/j.compeleceng.2024.109485
  3. Altwaijry, N. 2020. Keystroke dynamics analysis for user authentication using a deep learning approach. IJCSNS International Journal of Computer Science and Network Security 20, 209–216.
  4. Altwaijry, N. 2023. Authentication by keystroke dynamics: The influence of typing language. Applied Sciences 13, 11478. DOI: https://doi.org/10.3390/app132011478
  5. Andrean, A., Jayabalan, M., and Thiruchelvam, V. 2020. Keystroke dynamics based user authentication using deep multilayer perceptron. 10, 134–139. DOI: https://doi.org/10.18178/ijmlc.2020.10.1.910
  6. Bharadwaj, M. et al. 2015. A keystroke dynamics based authentication system. Journal of Basic and Applied Engineering Research.
  7. Bicakci, K., Salman, O., Uzunay, Y., and Tan, M. 2020. Analysis and evaluation of keystroke dynamics as a feature of contextual authentication. 11–17. DOI: https://doi.org/10.1109/ISCTURKEY51113.2020.9307967
  8. Daribay, A., Obaidat, M., and Krishna, P. 2019. Analysis of authentication system based on keystroke dynamics. 1–6. DOI: https://doi.org/10.1109/CITS.2019.8862068
  9. Deng, Y. and Zhong, Y. 2015. Keystroke Dynamics Advances for Mobile Devices Using Deep Neural Network. Vol. 2. 59–70. DOI: https://doi.org/10.15579/gcsr.vol2.ch4
  10. Dhir, N., Sanchez-Ferro, A. ´ , Stafford, T., Bannard, C., and Edman, M. 2020. Identifying robust markers of parkinson’s disease in typing behaviour using a cnn-lstm network. In Proceedings of the 24th conference on computational natural language learning. 578–595. DOI: https://doi.org/10.18653/v1/2020.conll-1.47
  11. Dimaratos, A. and Pohn, D. ¨ 2023. Evaluation scheme to analyze keystroke dynamics methods. In International Conference on Information Systems Security and Privacy. DOI: https://doi.org/10.5220/0011626100003405
  12. Finnegan, O., White, J., Armstrong, B., Adams, E., Burkart, S., Beets, M., Nelakuditi, S., Willis, E., Klinggraeff, L., Parker, H., Bastyr, M., Zhu, X., Zhong, Z., and Weaver, R. 2024. The utility of behavioral biometrics in user authentication and demographic characteristic detection: a scoping review. Systematic Reviews 13, 61. DOI: https://doi.org/10.1186/s13643-024-02451-1
  13. Gonzalez, N. ´ , Calot, E., Ierache, J., and Hasperu´ e, W. 2021. On the shape of timings distributions in free-text keystroke dynamics profiles. Heliyon 7, e08413. DOI: https://doi.org/10.1016/j.heliyon.2021.e08413
  14. Kasprowski, P., Borowska, Z., and Harezlak, K. 2022. Biometric identification based on keystroke dynamics. Sensors 22, 9. DOI: https://doi.org/10.3390/s22093158
  15. Killourhy, K. and Maxion, R. 2009. Comparing anomaly-detection algorithms for keystroke dynamics. IEEE/IFIP International Conference on Dependable Systems Networks, 125 – 134. DOI: https://doi.org/10.1109/DSN.2009.5270346
  16. KRISHNA, B. R. and VARMA, M. S. 2023. Enhancing user-level security: Performance analysis of machine learning algorithms for dynamic keystroke analysis. Journal of Theoretical and Applied Information Technology 101, 5313–5324.
  17. Mansour, K. and Mahmoud, K. 2021. A new approach for textual password hardening using keystroke latency times. The International Arab Journal of Information Technology 18, 336–346. DOI: https://doi.org/10.34028/iajit/18/3/10
  18. Mwandau, B. and Nyanchama, M. 2018. Investigating keystroke dynamics as a two-factor biometric security.
  19. Nakade, S. I. 2023. Biometrics behaviorinuser authentication. International Research Journal of Modernization in Engineering Technology and Science.
  20. Rybnik, M., Tabedzki, M., Adamski, M., and Saeed, K. 2013. An exploration of keystroke dynamics authentication using non-fixed text of various length. Proceedings - 2013 International Conference on Biometrics and Kansei Engineering, ICBAKE 2013 , 245–250. DOI: https://doi.org/10.1109/ICBAKE.2013.48
  21. Sawant, T., Parulekar, W., and Joshi, T. 2023. A study on biometric authentication systems, privacy concerns and mitigation strategies. International Journal of Scientific Research in Science and Technology, 199–205. DOI: https://doi.org/10.32628/IJSRST52310413
  22. Shree, C. and Jagadamba, G. 2016. A three factor authentication system using keystroke dynamic. In Proc. of National Conference on recent trends in communication and computing. Davengere.
  23. Smys, S., Chen, J., and Shakya, S. 2020. Survey on neural network architectures with deep learning. Journal of Soft Computing Paradigm 2, 186–194. DOI: https://doi.org/10.36548/jscp.2020.3.007
  24. Solano, J., Tengana Hurtado, L., Castelblanco, A., Rivera, E., and Lopez, C. 2020. A few-shot practical behavioral biometrics model for login authentication in web applications. In NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb’20). DOI: https://doi.org/10.14722/madweb.2020.23011
  25. Subhani, A., Khan, I., and Zubair, A. 2021. Review of insider and insider threat detection in the organizations. Journal of Advanced Research in Social Sciences and Humanities 6. DOI: https://doi.org/10.26500/JARSSH-06-2021-0402
  26. Zargar, S. 2021. Introduction to sequence learning models: Rnn, lstm, gru.