About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing

Research Article

Keystroke-dynamics authentication against synthetic forgeries

Download1063 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2010.16,
        author={Deian Stefan and Danfeng (Daphne) Yao},
        title={Keystroke-dynamics authentication against synthetic forgeries},
        proceedings={6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2011},
        month={5},
        keywords={Keystroke dynamics authentication malware detection forgery},
        doi={10.4108/icst.collaboratecom.2010.16}
    }
    
  • Deian Stefan
    Danfeng (Daphne) Yao
    Year: 2011
    Keystroke-dynamics authentication against synthetic forgeries
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2010.16
Deian Stefan1,*, Danfeng (Daphne) Yao2,*
  • 1: Department of Electrical Engineering, The Cooper Union, New York, NY 10003
  • 2: Department of Computer Science, Virginia Tech, Blacksburg, VA 24060
*Contact email: stefan@cooper.edu, danfeng@cs.vt.edu

Abstract

We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called TUBA for monitoring a user's typing patterns. We evaluate the robustness of TUBA through comprehensive experimental evaluation including two series of simulated bots. Support vector machine is used for classification. Our results based on 20 users' keystroke data are reported. Our work shows that keystroke dynamics is robust against synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke datasets other than the target. TUBA is particularly suitable for detecting extrusion in organizations and protecting the integrity of hosts in collaborative environments, as well as authentication.

Keywords
Keystroke dynamics authentication malware detection forgery
Published
2011-05-12
Publisher
IEEE
http://dx.doi.org/10.4108/icst.collaboratecom.2010.16
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL