Free-text Keystroke Authentication using Transformers: A Comparative Study of Architectures and Loss Functions (2310.11640v1)
Abstract: Keystroke biometrics is a promising approach for user identification and verification, leveraging the unique patterns in individuals' typing behavior. In this paper, we propose a Transformer-based network that employs self-attention to extract informative features from keystroke sequences, surpassing the performance of traditional Recurrent Neural Networks. We explore two distinct architectures, namely bi-encoder and cross-encoder, and compare their effectiveness in keystroke authentication. Furthermore, we investigate different loss functions, including triplet, batch-all triplet, and WDCL loss, along with various distance metrics such as Euclidean, Manhattan, and cosine distances. These experiments allow us to optimize the training process and enhance the performance of our model. To evaluate our proposed model, we employ the Aalto desktop keystroke dataset. The results demonstrate that the bi-encoder architecture with batch-all triplet loss and cosine distance achieves the best performance, yielding an exceptional Equal Error Rate of 0.0186%. Furthermore, alternative algorithms for calculating similarity scores are explored to enhance accuracy. Notably, the utilization of a one-class Support Vector Machine reduces the Equal Error Rate to an impressive 0.0163%. The outcomes of this study indicate that our model surpasses the previous state-of-the-art in free-text keystroke authentication. These findings contribute to advancing the field of keystroke authentication and offer practical implications for secure user verification systems.
- Typenet: Deep learning keystroke biometrics. IEEE Transactions on Biometrics, Behavior, and Identity Science 4(1), 57–70.
- Anusas-Amornkul, T. (2019). Strengthening password authentication using keystroke dynamics and smartphone sensors. In Proceedings of the 9th International Conference on Information Communication and Management, pp. 70–74.
- Fast free-text authentication via instance-based keystroke dynamics. IEEE Transactions on Biometrics, Behavior, and Identity Science 2(4), 377–387.
- User authentication with keystroke dynamics in long-text data. In 2016 IEEE 8th international conference on biometrics theory, applications and systems (BTAS), pp. 1–6. IEEE.
- Sensitivity analysis in keystroke dynamics using convolutional neural networks. In 2017 IEEE workshop on information forensics and security (WIFS), pp. 1–6. IEEE.
- Multi-model authentication using keystroke dynamics for smartphones. In 2018 IEEE 8th International Conference on Consumer Electronics-Berlin (ICCE-Berlin), pp. 1–6. IEEE.
- Authentication on the go: Assessing the effect of movement on mobile device keystroke dynamics. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 163–173.
- Observations on typing from 136 million keystrokes. In Proceedings of the 2018 CHI conference on human factors in computing systems, pp. 1–12.
- Meta-heuristic optimization and keystroke dynamics for authentication of smartphone users. Mathematics 10(16), 2912.
- Continuous authentication on mobile devices by analysis of typing motion behavior. Sicherheit 2014–Sicherheit, Schutz und Zuverlässigkeit.
- Keystroke analysis of free text. ACM Transactions on Information and System Security (TISSEC) 8(3), 312–347.
- Secure, usable and privacy-friendly user authentication from keystroke dynamics. In Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings 21, pp. 256–268. Springer.
- Securing keystroke dynamics from replay attacks. Applied Soft Computing 85, 105798.
- In defense of the triplet loss for person re-identification. arXiv preprint arXiv:1703.07737.
- Effect of data size on performance of free-text keystroke authentication. In IEEE international conference on identity, security and behavior analysis (ISBA 2015), pp. 1–7. IEEE.
- Keystroke statistical learning model for web authentication. In Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp. 359–361.
- Killourhy, K. S. and R. A. Maxion (2009). Comparing anomaly-detection algorithms for keystroke dynamics. In 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp. 125–134. IEEE.
- Freely typed keystroke dynamics-based user authentication for mobile devices based on heterogeneous features. Pattern Recognition 108, 107556.
- Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Applied Soft Computing 62, 1077–1087.
- Free-text keystroke dynamics for user authentication. In Artificial Intelligence for Cybersecurity, pp. 357–380. Springer.
- Monaco, J. V. and C. C. Tappert (2018). The partially observable hidden markov model and its application to keystroke dynamics. Pattern Recognition 76, 449–462.
- Authentication via keystroke dynamics. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56.
- Setmargin loss applied to deep keystroke biometrics with circle packing interpretation. Pattern Recognition 122, 108283.
- Investigate the impact of user’s state on the quality of authentication by keystroke dynamic. In Journal of Physics: Conference Series, Volume 2182, pp. 012097. IOP Publishing.
- Fixed-text vs. free-text keystroke dynamics for user authentication. Engineering Research Journal-Faculty of Engineering (Shoubra) 51(1), 95–104.
- A survey paper on keystroke dynamics authentication for current applications. In AIP Conference Proceedings, Volume 2173. AIP Publishing.
- User authentication using combination of behavioral biometrics over the touchpad acting like touch screen of mobile device. In 2008 International Conference on Computer and Electrical Engineering, pp. 82–86. IEEE.
- Keystroke dynamics: Concepts, techniques, and applications. arXiv preprint arXiv:2303.04605.
- Mobile keystroke biometrics using transformers. In 2023 IEEE 17th International Conference on Automatic Face and Gesture Recognition (FG), pp. 1–6. IEEE.
- Behavepassdb: public database for mobile behavioral biometrics and benchmark evaluation. Pattern Recognition 134, 109089.
- Bioprivacy: Development of a keystroke dynamics continuous authentication system. In European Symposium on Research in Computer Security, pp. 158–170. Springer.
- Van der Maaten, L. and G. Hinton (2008). Visualizing data using t-sne. Journal of machine learning research 9(11).
- Attention is all you need. Advances in neural information processing systems 30.
- Continuous authentication by free-text keystroke based on cnn plus rnn. Procedia computer science 147, 314–318.
- Decoupled contrastive learning. In European Conference on Computer Vision, pp. 668–684. Springer.
- Keystroke-based user identification on smart phones. In International Workshop on Recent advances in intrusion detection, pp. 224–243. Springer.