6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

Keystroke-dynamics authentication against synthetic forgeries

Download556 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2010.16,
        author={Deian Stefan and Danfeng (Daphne) Yao},
        title={Keystroke-dynamics authentication against synthetic forgeries},
        proceedings={6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2011},
        month={5},
        keywords={Keystroke dynamics authentication malware detection forgery},
        doi={10.4108/icst.collaboratecom.2010.16}
    }
    
  • Deian Stefan
    Danfeng (Daphne) Yao
    Year: 2011
    Keystroke-dynamics authentication against synthetic forgeries
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2010.16
Deian Stefan1,*, Danfeng (Daphne) Yao2,*
  • 1: Department of Electrical Engineering, The Cooper Union, New York, NY 10003
  • 2: Department of Computer Science, Virginia Tech, Blacksburg, VA 24060
*Contact email: stefan@cooper.edu, danfeng@cs.vt.edu

Abstract

We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called TUBA for monitoring a user's typing patterns. We evaluate the robustness of TUBA through comprehensive experimental evaluation including two series of simulated bots. Support vector machine is used for classification. Our results based on 20 users' keystroke data are reported. Our work shows that keystroke dynamics is robust against synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke datasets other than the target. TUBA is particularly suitable for detecting extrusion in organizations and protecting the integrity of hosts in collaborative environments, as well as authentication.