samples per subject. We shall also investigate more
efficient algorithms to improve the performance. We
hypothesize that by fusion of command lines and
keystroke dynamics, we will significantly improve
the performance of intrusion detection. Lastly, we
plan to field-test the effectiveness of this method in
preventing and detecting advanced persistent threats
(APT) (NIST, 2012).
ACKNOWLEDGMENTS
This work were partially supported by NSF Award
CNS-1650503. Wang, Hou, and Schuckers were also
supported by NSF Award TI-2122746.
REFERENCES
Araujo, L. C., Sucupira, L. H., Lizarraga, M. G., Ling,
L. L., and Yabu-uti, J. B. (2004). User authentica-
tion through typing biometrics features. In Biometric
Authentication: First International Conference, ICBA
2004, Hong Kong, China, July 15-17, 2004. Proceed-
ings, pages 694–700. Springer.
Banerjee, S. and Woodard, D. (2012). Biometric authenti-
cation and identification using keystroke dynamics: A
survey. Journal of Pattern recognition research.
Chandran, S., Hrudya, P., and Poornachandran, P. (2015).
An efficient classification model for detecting ad-
vanced persistent threat. In 2015 international confer-
ence on advances in computing, communications and
informatics (ICACCI), pages 2001–2009. IEEE.
CISA: Cyber & Infrastructure Security Agency (2023a).
Advanced persistent threats and nation-state actors–
helping cybersecurity defenders protect against and
respond to apts. [Online]. Available: CISA APT
(2023), https://www.cisa.gov/topics/cyber-threats
-and-advisories/advanced-persistent-threats-and-nat
ion-state-actors.
CISA: Cyber & Infrastructure Security Agency (2023b).
People’s republic of china state-sponsored cyber ac-
tor living off the land to evade detection. [Online].
Available: Volt Typhoon (2023), https://www.cisa.g
ov/news-events/cybersecurity-advisories/aa23-144a.
DOJ (2023a). Chinese Military Personnel Charged
with Computer Fraud, Economic Espionage and Wire
Fraud for Hacking into Credit Reporting Agency
Equifax. [Online]. Available: DOJ Equifax Indict-
ment (2020), https://www.justice.gov/opa/pr/chine
se-military-personnel-charged-computer-fraud-eco
nomic-espionage-and-wire-fraud-hacking.
DOJ (2023b). U.S. Charges Russian FSB Officers and Their
Criminal Conspirators for Hacking Yahoo and Mil-
lions of Email Accounts. [Online]. Available: DOJ
Yahoo Indictment (2017), https://www.justice.gov/op
a/pr/us-charges-russian-fsb-officers-and-their-crimi
nal-conspirators-hacking-yahoo-and-millions.
Greenberg, S. (1988). Using unix: Collected traces of 168
users. University of Calgary.
Killourhy, K. S. and Maxion, R. A. (2009). Comparing
anomaly-detection algorithms for keystroke dynam-
ics. In 2009 IEEE/IFIP International Conference
on Dependable Systems & Networks, pages 125–134.
IEEE.
Maxion, R. A. (2003). Masquerade detection using en-
riched command lines. In 2003 International Con-
ference on Dependable Systems and Networks, pages
5–14. IEEE.
Maxion, R. A. and Townsend, T. N. (2002). Masquerade
detection using truncated command lines. In Proceed-
ings international conference on dependable systems
and networks, pages 219–228. IEEE.
Maxion, R. A. and Townsend, T. N. (2004). Masquerade
detection augmented with error analysis. IEEE Trans-
actions on Reliability, 53(1):124–147.
Mirza, N. A. S., Abbas, H., Khan, F. A., and Al Muhtadi, J.
(2014). Anticipating advanced persistent threat (apt)
countermeasures using collaborative security mecha-
nisms. In 2014 International Symposium on Biomet-
rics and Security Technologies (ISBAST), pages 129–
132. IEEE.
NIST (2012). NIST Special Publication 800-39 Managing
Information Security Risk. CreateSpace, Scotts Valley,
CA.
Ray-Dowling, A., Hou, D., and Schuckers, S. (2023). Sta-
tionary mobile behavioral biometrics: A survey. Com-
puters & Security, 128:103184.
Schonlau, M., DuMouchel, W., Ju, W.-H., Karr, A. F.,
Theus, M., and Vardi, Y. (2001). Computer intrusion:
Detecting masquerades. Statistical science, pages 58–
74.
Shadman, R., Wahab, A. A., Manno, M., Lukaszewski, M.,
Hou, D., and Hussain, F. (2023). Keystroke dynam-
ics: Concepts, techniques, and applications. [Online].
Available: arXiv:2303.04605, 2023.
Tschinkel, B., Esantsi, B., Iacovelli, D., Nagesar, P., Walz,
R., Monaco, V., and Bakelman, N. (2017). Keylog-
ger keystroke biometric system. [Online]. Available:
Research Gate (2017).
Vural, E., Huang, J., Hou, D., and Schuckers, S. (2014).
Shared research dataset to support development of
keystroke authentication. In IEEE International joint
conference on biometrics, pages 1–8. IEEE.
Wahab, A. A., Hou, D., Schuckers, S., and Barbir, A.
(2021). Utilizing keystroke dynamics as additional
security measure to protect account recovery mech-
anism. In ICISSP, pages 33–42.
Zhong, Y., Deng, Y., and Jain, A. K. (2012). Keystroke
dynamics for user authentication. In 2012 IEEE com-
puter society conference on computer vision and pat-
tern recognition workshops, pages 117–123. IEEE.
A Novel Keystroke Dataset for Preventing Advanced Persistent Threats
901