Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection

Subash, Aditya, Song, Insu, and Tao, Kexin (2023) Robust Keystroke Behavior Features for Continuous User Authentication for Online Fraud Detection. In: Lecture Notes in Networks and Systems (693) pp. 879-891. From: ICICT 2023: International Conference on Information and Computer Technologies, 24-26 March 2023, London, UK.

[img] PDF (Publisher Accepted Version) - Accepted Version
Restricted to Repository staff only

View at Publisher Website: https://doi.org/10.1007/978-981-99-3243-...
 
2


Abstract

Recently, behavioral biometric-based user authentication methods, such as keystroke dynamics, have become a popular alternative to improve security of online platforms, due to their non-invasive nature. However, currently there are very few behavioral biometric authentication methods that provide non-invasive continuous user authentication for online education platforms, resulting in frequent network intrusion and online assessment fraud. Existing approaches mostly analyze the typing behavior of users using a fixed sequence of characters. Furthermore, a better set of features are required to reduce false positive rate for satisfactory performance to prevent online fraud. Existing behavioral analysis methods also mostly rely on conventional machine learning approaches despite recent advancement in deep learning approaches. We identify a set of keystroke behavioral biometric features that yield satisfactory performance by identifying most frequently used features. We also collect new free-form keystroke behavior data during online assessment activities and develop non-invasive continuous authentication methods for free-form text behavior analysis using deep learning approaches. We also compare performance between deep learning and conventional machine learning approaches and evaluate the robustness of the most frequently used features. Result analysis shows that deep learning approaches outperform machine learning approaches on most frequently used feature set. Furthermore, it is found that the identified feature set is robust and results in satisfactory performance in deep learning approaches.

Item ID: 80966
Item Type: Conference Item (Research - E1)
ISBN: 9789819932429
ISSN: 2367-3389
Keywords: Continuous user authentication, Deep learning, Most frequently used features, Online fraud, Robustness
Copyright Information: © The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023.
Date Deposited: 08 Nov 2023 01:40
FoR Codes: 46 INFORMATION AND COMPUTING SCIENCES > 4604 Cybersecurity and privacy > 460499 Cybersecurity and privacy not elsewhere classified @ 50%
46 INFORMATION AND COMPUTING SCIENCES > 4603 Computer vision and multimedia computation > 460308 Pattern recognition @ 50%
SEO Codes: 22 INFORMATION AND COMMUNICATION SERVICES > 2204 Information systems, technologies and services > 220405 Cybersecurity @ 100%
Downloads: Total: 2
More Statistics

Actions (Repository Staff Only)

Item Control Page Item Control Page