Your search
Results 3 resources
-
The cyber-behavioral biometric modalities such as keystroke dynamics, mouse dynamics, and touch screen dynamics have come under attacks of different forms in recent days. To address these attacks and other security issues, we present a novel concept of using smartwatch sensor data to continuously verify users in cyberspace and show its potential to be a new standalone cyber-behavioral biometric modality. For our experiments, smartwatch gyroscope and accelerometer data collected from 49 subjects while typing in desktop computer have been considered. We implemented six pattern matching classifiers to compare each verification attempt against the user profile. Experimental results comprising of 282, 240 classification attempts show significantly high True Positive (TP) rates and extremely low False Positive (FP) rates with the highest achieved TP rate of 87.2% and lowest FP rate of 0.2%. With this level of accuracy and natural resiliency to attacks comes with physical biometric property as such in hand movement, we opine that smartwatch movement dynamics, besides being a new biometric trait, can be a solution to the security loopholes in existing cyber-behavioral biometric modalities for continuous verification. © 2020 IEEE.
-
Traditional keyboards remain the input device of choice for typing-heavy environments. When attached to sensitive data, security is a major concern. To continuously authenticate users in these environments, use of keystroke dynamics can be a preferred choice. An integral part of user enrollment in a keystroke based continuous authentication system is the writing instruction (prompt) given to the users, to use as a basis for their improvised writing. There are many prompts possible, and they directly impact the performance of authentication systems. Hence, prompts should be designed carefully, and with purpose. In this paper, we bridge the gap between cognitive psychology and computer science and attempt to influence the mental state of the users to acquire a better authentication performance. We compare two kinds of writing prompts, creative and factual, for generating reference samples. In addition, we perform two robustness tests: robustness to dissimilar writing style (e.g., creative reference and factual test) and robustness to surface (e.g., hard surface reference and soft surface test). We collect data from thirty participants in four weekly sessions. We experiment with three features: key interval, key press, and key hold latencies. We use Relative (R) measure to generate the match score between the reference and test samples. Results show that creative writing consistently performs better than the factual one. Both writing prompts perform well with dissimilar style in testing, i.e., continuous authentication is found robust to writing style. Also, we find that the surface (hard or soft) used in testing need not match that used for the reference, thus continuous authentication is also surface robust. © 2020 IEEE.
-
Keystroke dynamics has been used as a form of one-time user authentication and continuous verification especially when it comes to securing the cyberspace. In this paper, we present the idea of using keystroke dynamics as a form of second layer authentication in web applications. We showed that this method can authenticate a user with high accuracy and can be used as an alternate to CAPTCHA tests, security questions and image selections that are being used today. We have developed a working web-based platform in a browser environment that enforces the proposed second-layer security. We performed penetration test experiments by launching a total of 598,500 impostor and genuine authentication attempts and found the Equal Error Rate (EER) as 10.5%. © 2019 IEEE.
Explore
Resource type
- Conference Paper (3)
Publication year
-
Between 2000 and 2026
(3)
-
Between 2010 and 2019
(1)
- 2019 (1)
-
Between 2020 and 2026
(2)
- 2020 (2)
-
Between 2010 and 2019
(1)
Resource language
- English (3)