Continuous Typist Verification using Machine Learning

作者: Kathryn Hempstalk

DOI:

关键词:

摘要: A keyboard is a simple input device. Its function to send keystroke information the computer (or other device) which it attached. Normally this employed solely produce text, but can also be utilized as part of an authentication system. Typist verification exploits typist’s patterns check whether they are who say are, even after standard schemes have confirmed their identity. This thesis investigates typists behave in sufficiently unique yet consistent manner enable effective level based on typing patterns. depends more than behaviour. The quality and algorithms used compare them determine how accurately performed. sheds light all technical aspects problem, including data collection, feature identification extraction, sample classification. dataset has been collected that comparable size, timing accuracy content others field, with one important exception: derived from real emails, rather samples artificial setting. gain insight into what features distinguish another. train learning make judgements origin previously unseen samples. These use “one-class classification”; predictions for particular user having trained only user’s examines many one-class classification algorithms, ones designed specifically typist verification. New proposed increase speed accuracy. best method performs at state art terms accuracy, while decreasing time taken prediction minutes seconds, and—more importantly—without requiring any negative users. Also, general: applies not verification, problem. Overall, concludes considered useful biometric technique.

参考文章(56)
Donald A. Norman, David E. Rumelhart, Studies of Typing from the LNR Research Group Springer, New York, NY. pp. 45- 65 ,(1983) , 10.1007/978-1-4612-5470-6_3
Donald R. Gentner, Jonathan T. Grudin, Serge Larochelle, Donald A. Norman, David E. Rumelhart, A Glossary of Terms Including a Classification of Typing Errors Springer, New York, NY. pp. 39- 43 ,(1983) , 10.1007/978-1-4612-5470-6_2
Mordechai Nisenson, Ido Yariv, Ran El-Yaniv, Ron Meir, Towards Behaviometric Security Systems: Learning to Identify a Typist european conference on principles of data mining and knowledge discovery. pp. 363- 374 ,(2003) , 10.1007/978-3-540-39804-2_33
Robert Tibshirani, Trevor Hastie, Jerome H. Friedman, The Elements of Statistical Learning ,(2001)
R. Stockton Gaines, Norman Shapiro, William Lisowski, S. James Press, Authentication by Keystroke Timing: Some Preliminary Results RAND Corporation. ,(1980)
Kathryn Hempstalk, Eibe Frank, Ian H. Witten, One-Class Classification by Combining Density and Class Probability Estimation european conference on machine learning. ,vol. 5211, pp. 505- 519 ,(2008) , 10.1007/978-3-540-87479-9_51
D.V. Klein, Foiling the cracker: A survey of, and improvements to, password security Programming and Computer Software. ,vol. 17, ,(1992)
Foster Provost, Pedro Domingos, Tree Induction for Probability-Based Ranking Machine Learning. ,vol. 52, pp. 199- 215 ,(2003) , 10.1023/A:1024099825458
Paul S. Dowland, Steven M. Furnell, A Long-Term Trial of Keystroke Profiling Using Digraph, Trigraph and Keyword Latencies information security conference. pp. 275- 289 ,(2004) , 10.1007/1-4020-8143-X_18