light of the fact that insider attacks has been
increasing. Consequently, methods of continuous
user authentication became an issue of growing
concern. In general, these methods can recognize an
intruder by identifying deviations in the normal
behavior pattern of a user in a system.
In this paper, by employing the pattern
recognition potential of neural networks, it was
proposed a method for continuous user
authentication based on keystroke dynamics.
Nonetheless, the sensitiveness of traditional training
algorithms to initial conditions is a well-known
problem in neural network applications. In order to
deal with this problem, we tested the application of
evolutionary neural networks based on both
Darwinian and Lamarckian evolution. As it could be
observed, if one considers that training time is not a
limiting factor, since training may be performed
once per user, a Lamarckian evolutionary training
algorithm is an appropriate choice. Nonetheless, the
use of evolutionary algorithms implies the need of
adjusting an increased number of parameters.
In our experiments, biometric rates (FAR and
FRR) were enhanced by the hybrid approaches
(evolutionary training) over a traditional single back
propagation. Besides that, evolutionary artificial
neural networks provide a more reliable training, as
they are less likely to select an inappropriate set of
weights, when compared to a simple set of random
values.
In future works, we intend to extract and analyze
other features from the keystroke dynamics in order
to select a set of features which allows a greater
differentiation between legitimate users and
intruders. Apart from that, additional behavior
features (e.g. mouse dynamics) can be explored to
improve the overall system performance.
ACKNOWLEDGEMENTS
The authors would like to thank Dr. Luciana Kassab
(FATEC-SP) for her help, and CNPq (grant
304322/2009-1) and FAT for financial support.
REFERENCES
Ahmed, A. A. E., Traore, I., Almulhem, A., 2008. Digital
Fingerprint Based on Keystroke Dynamics. In:
Proceedings of the Second International Symposium
on Human Aspects of Information Security &
Assurance.
Braga, A. P., Carvalho, A. C. P. L. F., Ledermir, T. B.,
2007. Artificial Neural Networks. (in Portuguese)
LTC.
Castillo, P. A., Arenas, M. G., Castellano, J. G., Merelo, J.
J., Prieto, A., Rivas, V., Romero, G., 2006.
Lamarckian Evolution and the Baldwin Effect in
Evolutionary Neural Networks. Computing Research
Repository (CoRR).
Cortez, P., Rocha, M., Neves, J., 2002. A Lamarckian
Approach for Neural Network Training. Neural
Processing Letters, Vol. 15. Springer.
Cho, S., Han, C., Han, D. H., Kim, H., 2000. Web-Based
Keystroke Dynamics Identity Verification Using
Neural Network. In: Journal of Organizational
Computing and Electronic Commerce, Vol. 10. Taylor
& Francis.
De Castro, L. N., 2006. Fundamentals of Natural
Computing. Chapman & Hall/CRC.
Di Pietro, R., Mancini, L. V., 2008. Intrusion Detection
Systems. Series: Advances in Information Security -
Vol. 38. Springer.
Duserick, W., 2004. Whitepaper on Liberty Protocol and
Identity Theft. Liberty Alliance Project.
Elftmann, P., 2006. Secure Alternatives to Password-
based Authentication Mechanisms. Laboratory for
Dependable Distributed Systems. RWTH Aachen
University.
Gaines, R., Lisowski, W., Press, S., Shapiro, N., 1980.
Authentication by keystroke timing: Some preliminary
results. Technical Report Rand report R-256-NSF.
Rand corporation.
Joyce, R., Gupta, G., 1990. Identity Authentication Based
on Keystroke Latencies, Communications of the ACM,
v. 33, p. 168-176.
Kolen, J. F., Pollack, J. B., 1990. Back Propagation is
Sensitive to Initial Conditions. Laboratory for
Artificial Intelligence Research. The Ohio State
University.
Kowalski, E., Cappelli, D., 2008. Insider Threat Study:
Illicit Cyber Activity in the Information Technology
and Telecommunications Sector. Software
Engineering Institute, Carnegie Mellon.
Ku, K. W. C., Mak, M. W., Siu, W. C, 2003. Approaches
to Combining Local and Evolutionary Search for
Training Neural Networks: A Review and Some New
Results. In A. Ghosh and S. Tsutsui, editors, Advances
in Evolutionary Computation. Springer-Verlag.
Richardson, R., 2003. CSI/FBI Computer Crime and
Security Survey. Computer Security Institute.
Sang, Y., Shen, H., Fan, P., 2004. Novel Impostors
Detection in Keystroke Dynamics by Support Vector
Machine. Parallel and Distributed Computing:
Applications and Technologies, Vol. 3320/2005.
Springer, Heidelberg.
Wang, L., Geng, X., 2009. Behavioral Biometrics for
Human Identification. Medical Information Science
Reference. IGI Global.
Windley
, P. J., 2005. Digital Identity. O'Reilly Media.
Yao, X., 1999. Evolving artificial neural networks. In:
Proceedings of the IEEE, 87(9):1423-1447. IEEE
Press.
ICEC 2010 - International Conference on Evolutionary Computation
364