KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

by   Soumyatattwa Kar, et al.

Cyber attacks has always been of a great concern. Websites and services with poor security layers are the most vulnerable to such cyber attacks. The attackers can easily access sensitive data like credit card details and social security number from such vulnerable services. Currently to stop cyber attacks, various different methods are opted from using two-step verification methods like One-Time Password and push notification services to using high-end bio-metric devices like finger print reader and iris scanner are used as security layers. These current security measures carry a lot of cons and the worst is that user always need to carry the authentication device on them to access their data. To overcome this, we are proposing a technique of using keystroke dynamics (typing pattern) of a user to authenticate the genuine user. In the method, we are taking a data set of 51 users typing a password in 8 sessions done on alternate days to record mood fluctuations of the user. Developed and implemented anomaly-detection algorithm based on distance metrics and machine learning algorithms like Artificial Neural networks (ANN) and convolutional neural network (CNN) to classify the users. In ANN, we implemented multi-class classification using 1-D convolution as the data was correlated and multi-class classification with negative class which was used to classify anomaly based on all users put together. We were able to achieve an accuracy of 95.05 can say that the model works perfectly and can be bought into the market as a security layer and a good alternative to two-step verification using external devices. This technique will enable users to have two-step security layer without worrying about carry an authentication device.


page 1

page 2

page 3

page 4


CyberLearning: Effectiveness Analysis of Machine Learning Security Modeling to Detect Cyber-Anomalies and Multi-Attacks

Detecting cyber-anomalies and attacks are becoming a rising concern thes...

A User-Based Authentication and DoS Mitigation Scheme for Wearable Wireless Body Sensor Networks

Wireless Body Sensor Networks (WBSNs) is one of the greatest growing tec...

Machine Learning Algorithms In User Authentication Schemes

In the past two decades, the number of mobile products being created by ...

Explainable and Optimally Configured Artificial Neural Networks for Attack Detection in Smart Homes

In recent years cybersecurity has become a major concern in adaptation o...

A Robust Certificate Management System to Prevent Evil Twin Attacks in IEEE 802.11 Networks

The evil twin attack is a major security threat to WLANs. An evil twin i...

Phishing and Spear Phishing: examples in Cyber Espionage and techniques to protect against them

Phishing attacks have become the most used technique in the online scams...

Please sign up or login with your details

Forgot password? Click here to reset