User authentication and distinguishing child users from adults with keystroke dynamics

Download
2013
Uzun, Yasin
Keystroke Dynamics, which is a biometric characteristic that depends on typing style of users, could be a viable alternative or a complementary technique for user authentication if tolerable error rates are achieved. Moreover, biometric data can also be used for inferring personal characteristics. Therefore it is possible to benefit from Keystroke Dynamics to predict infor- mation, such as age and gender. In this thesis study, the performance of artificial neural network algorithms for Keystroke Dynamics based authentication is measured using a publicly available dataset. For this pur- pose, comparative tests of di erent algorithms for training neural networks are conducted and an equal error rate of 7.73 percent with Levenberg-Marquardt backpropagation network is achieved as a result. Regarding to detecting age group and gender information based on typing data, classification accuracies for 13 di erent algorithms is assessed. For this purpose, a new typing dataset from 100 users including male and female, adult and child subjects is collected. For age group detection, average error rates down to 8.2 percent is achieved using k-nearest neighbor algorithm. On the other hand, the minimum error rate recorded for gender prediction was 40 percent, using the same dataset and methodologies that are used for age group detection. The dataset and implementation for the whole experiment and test procedure is made publicly available to promote future works focusing on this subject

Suggestions

A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
Uzun, Yasin; BIÇAKCI, KEMAL (2012-07-01)
Keystroke Dynamics, which is a biometric characteristic that depends on typing style of users, could be a viable alternative or a complementary technique for user authentication if tolerable error rates are achieved. Most of the earlier studies on Keystroke Dynamics were conducted with irreproducible evaluation conditions therefore comparing their experimental results are difficult, if not impossible. One of the few exceptions is the work done by Killourhy and Maxion, which made a dataset publicly available...
On the efficiency of authentication protocols, digital signatures and their applications in e-health: a top-down approach
Bıçakçı, Kemal; Baykal, Nazife; Department of Information Systems (2003)
Choosing an authentication protocol or a digital signature algorithm becomes more challenging when performance constraints are of concern. In this thesis, we discuss the possible options in a top-down approach and propose viable alternatives for the efficiency criteria. Before all the technical discussions, argue that identifying prerequisites, threats and risks on an organizational conthas utmost importance so that effective solutions can be delivered at a reasonable cost. For instance, one approach to sol...
The role of visual features in text-based captchas: an fnirs study for usable security
Mülazimoğlu, Emr; Acartürk, Cengiz; Department of Cyber Security (2019)
In order to mitigate dictionary attacks or similar undesirable automated attacks to information systems, developers mostly prefer using CAPTCHA challenges as Human Interactive Proofs (HIPs) to distinguish between human users and scripts. An appropriate use of CAPTCHA requires a setup balance between robustness and usability during the design of a challenge. The previous research reveals that most of the usability studies have used accuracy and response time as measurement criteria for quantitative analysis....
Security on mobile phones with lightweight cryptographic message syntax
Kubilay, Murat Yasin; Özgit, Attila; Department of Computer Engineering (2007)
Cryptographic Message Syntax (CMS) is a standard for protecting messages cryptographically. Using CMS, messages can be protected in different content types such as signed-data, enveloped-data, digested-data and authenticated-data. CMS is architected around certificate based key management and symmetric cryptography. In this thesis, a lightweight CMS envelope is proposed for the mobile phones which have limited memory and processing power, in order to provide the privacy of the data either stored on them or ...
Using social graphs in one-class collaborative filtering problem
Kaya, Hamza; Alpaslan, Ferda Nur; Department of Computer Engineering (2009)
One-class collaborative filtering is a special type of collaborative filtering methods that aims to deal with datasets that lack counter-examples. In this work, we introduced social networks as a new data source to the one-class collaborative filtering (OCCF) methods and sought ways to benefit from them when dealing with OCCF problems. We divided our research into two parts. In the first part, we proposed different weighting schemes based on social graphs for some well known OCCF algorithms. One of the weig...
Citation Formats
Y. Uzun, “User authentication and distinguishing child users from adults with keystroke dynamics,” Ph.D. - Doctoral Program, Middle East Technical University, 2013.