Soft Biometrics for Authentication and Identification Hand Based on the Use of the Keyboard
https://doi.org/10.31854/1813-324X-2024-10-6-55-67
EDN: BGOBWS
Abstract
Relevance. Nowadays, technological systems, artificial intelligence, the general availability of the Internet and penetration into the systems of banks, institutions and social networks have become a studied science and are accessible to all groups and ages. One of the main tasks was to provide a system for protecting confidential information from hackers, as well as easy access to authentication and identification of users. Biometric systems came to the fore, including mouse movement dynamics and keystroke dynamics, which reveal the typing style and mouse movement of each person. Soft biometrics is an interesting and inexpensive biometric method that does not require additional equipment. The system identifies a person based on the input information they enter in a special column. Hand identification dynamics falls into the category of behavioral soft biometrics, that is, the user's patterns reflect the individual program of actions that he follows when using the site.
The goal of this article the purpose of this work is to improve the security level by creating a function that will strengthen the authentication system and improve the iron gate
Методы исследования. In carrying out the work, methods of analysis and synthesis, theories of algorithms, laws of kinematics, neural networks, keystroke dynamics and soft biometrics were used.
Results. A method for extracting dynamic characteristics of keystrokes is described. A neural network is created and a threshold value is determined for identifying the type of typing hand.
Scientific novelty. Unlike known authentication methods, the proposed method is used to determine the typing hand on the keyboard through a neural network using the laws of kinematics, soft biometrics and extracting the dynamics of keystrokes in order to determine the value and accuracy of determining the type of typing hand.
Significance. The proposed solution allows to increase the security of user authentication, increase the speed of implementation and reduce the cost. The results obtained in the work are positive and can be used in the near future. In turn, soft biometric measurements depend on human behavioral patterns, which complicates user falsification. It is difficult to imitate typing behavior, since it is ballistic (semi-autonomous), which makes behavioral information valuable as a soft and sensitive biometric method.
About the Authors
Y.M. A.A. AlotoumRussian Federation
A. V. Krasov
Russian Federation
References
1. Andrianov V.I., Krasov A.V., Lipatnikov V.A. Innovative Information Security Risk Management. St. Petersburg: SPbSUT Publ.; 2012. 396 p. (in Russ.) EDN:QSMDNH
2. Yakovlev V.A., Skachkova V.V. Automatic Selection of Graphical Materials for Authentication System Based on a Graphical Password. Information Security Problems. Computer Systems. 2015;1:64‒73. (in Russ.) EDN:TWHDDF
3. Minyaev A.A., Krasov A.V., Sakharov D.V. The Efficiency Evaluation Method of Distributed ISPd Protection System. Vestnik of St. Petersburg State University of Technology and Design. 2020;1:29‒33. (in Russ.) DOI:10.46418/2079-8199_2020_1_5. EDN:ULHTJK
4. Birikh E.V., Gruzdev A.S., Kamalova A.O., Sakharov D.V. Selection of tools for dynamic analysis of web application security for digital economy tasks. Zaŝita informacii. Inside. 2024;1(115):42‒46. (in Russ.) EDN:RLNHWK
5. Kaixin W., Hongri L., Bailing W., Shujie H., Jia S. User Authentication and Identification Model Based on Mouse Dynamics. Proceedings of the 6th International Conference on Information Engineering, ICIE '17, 17‒18 August 2017, Dalian Liaoning, China. New York: Association for Computing Machinery; 2017. Article No. 18. DOI:10.1145/3078564.3078581
6. Blaganesh P., Soniya A. A Survey of Authentication Based on Mouse Behaviours. International Journal of Advanced Information Science and Technology. 2014;3(2):42–45. DOI:10.15693/ijaist/2014.v3i2.42-45
7. Shen C., Cai Z., Guan X. Continuous Authentication for Mouse Dynamics: A Pattern-Growth Approach. Proceedings of the International Conference on Dependable Systems and Networks, DSN 2012, 25‒28 June 2012, Boston, USA. IEEE; 2012. DOI:10.1109/DSN.2012.6263955
8. Mondal S., Bours P. Continuous authentication using mouse dynamics. Proceedings of the International Conference of the BIOSIG Special Interest Group, BIOSIG, 05‒06 September 2013, Darmstadt, Germany. IEEE; 2013.
9. Hinbarji Z., Albatal R., Gurrin C. Dynamic User Authentication Based on Mouse Movements Curves. Proceedings of the International Conference on Multimedia Modeling, MMM 2015, 5‒7 January 2015, Sydney, Australia. Lecture Notes in Computer Science, vol.8936. Cham: Springer; 2015. p.111–122. DOI:10.1007/978-3-319-14442-9_10
10. Kasprowski P., Borowska Z., Harezlak K. Biometric Identification Based on Keystroke Dynamics. Sensors. 2022;22(9): 3158. DOI:10.3390/s22093158
11. Janakiraman R., Sim T. Keystroke Dynamics in a General Setting. Proceedings of the International Conference on Biometrics, ICB 2007, 27-29 August 2007, Seoul, Republic of Korea. Lecture Notes in Computer Science, vol. 4642. Berlin, Heidelberg: Springer; 2007. DOI:10.1007/978-3-540-74549-5_62
12. Tsimperidis I., Arampatzis A. The Keyboard Knows About You Revealing User Characteristics via Keystroke Dynamics. International Journal of Technoethics. 2020;11(2). DOI:10.4018/IJT.2020070103
13. Idrus S.Z.S., Cherrier E., Rosenberger C., Mondal S., Bours P. Keystroke dynamics performance enhancement with soft biometrics. Proceedings of the International Conference on Identity, Security and Behavior Analysis, ISBA 2015, 23‒25 March 2015, Hong Kong, China. IEEE; 2015. DOI:10.1109/ISBA.2015.7126345
14. Gaikwad J., Kulkarni B., Phadol N., Sarukte S. User Authentication using Keystroke Dynamics. Global Research and Development Journal for Engineering. 2018;3(6):58‒66.
15. Hassan S.I., Selim M.M., Zayed H.H. User Authentication with Adaptive Keystroke Dynamics. International Journal of Computer Science Issues. 2013;10(4):127–134.
16. Bours P. Continuous keystroke dynamics A different perspective towards biometric evaluation. Information Security Technical Report. 2012;17(1-2):36–43. DOI:10.1016/j.istr.2012.02.001
17. Mondal S., Bours P. Combining keystroke and mouse dynamics for continuous user authentication and identification. Proceedings of the International Conference on Identity, Security and Behavior Analysis, ISBA, 29 February ‒ 02 March 2016, Sendai, Japan. IEEE; 2016. DOI:10.1109/ISBA.2016.7477228
18. Idrus S.Z.S., Cherrier E., Rosenberger C., Bours P. Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords. Computers & Security. 2014;45:147–155. DOI:10.1016/j.cose.2014.05.008
19. Golovanov A.L. Development of an authentication system based on keyboard handwriting based on free texts. In: Mathematical and Computer Modeling. Collection of Materials of the XI International Scientific Conference Dedicated to the Memory of V.A. Romankov, 15 March 2024, Omsk, Russian Federation. Omsk: Dostoevsky Omsk State University Publ.; 2024. p.236‒237.
20. (in Russ.) EDN:AAOOFW
21. Satybaldieva M.M. Research of systems for user identification based on the analysis of keyboard handwriting. Scientific Aspect. 2024;14(5):1897‒1903. (in Russ.) EDN:DENDWJ
22. Yamali D.D. Revolution in authentication through keyboard handwriting. Research Center "Technical Innovations". 2024;23:114‒119. (in Russ.) EDN:NLCXWH
23. Polous K.I. Comparative analysis of biometric authentication methods Society. Youth. Society. Modern Science, Technology and Innovation. 2021;20:61‒63. EDN:MRRBLY
24. Semenova O.S., Fadeeva K.N. Biometric authentication and its types. Proceedings of the IIIrd All-Russian Scientific and Practical Conference with International Participation on Digital Technologies and Innovations in the Development of Science and Education, 07 April 2023, Cheboksary, Russian Federation. Cheboksary: I. Yakovlev Chuvash State Pedagogical University Publ.; 2023. p.186‒190. (in Russ.) EDN:ILSOXW
25. Larionov M.Yu. Prospects for the development of biometric identification and authentication of personality. Innovations. Science. Education. 2021;42:897‒902. (in Russ.) EDN:QEIUXB
26. Krasov A.V., Alyotum Yu., Ushakov I.A., Maksimov V.V., Arkhipov A.V. User authentication and identification using biometric keystroke dynamics based on the “Manhattan and Euclidean distance”. Vestnik of St. Petersburg State University of Technology and Design. Series 1: Natural and Technical Sciences. 2023;4:49‒56. (in Russ.) DOI:10.46418/2079-8199_2023_4_10. EDN:ZBXUBO
27. Yousef M.A.A.A. Biometric and behavioral authentication and soft biometrics using keystroke and mouse dynamics // Proceedings of the XIIth International Conference on Infotelecommunications in Science and Education, 28 February ‒ 01 March 2022, St. Petersburg, Russian Federation. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 2023. p. 70‒75. (in Russ.) EDN:QTKUGV
28. Shahin G. Biometrics in embedded systems. E-Scio. 2020;6(45):314‒320. (in Russ.) EDN:ZYRDPR
29. Ermisheva Yu.D., Omelchenko T.A. Separate results of the application of the software authentication tool by key-stroke dynamics. NBI Technologies. 2023;17(1):11‒16. (in Russ.) DOI:10.15688/NBIT.jvolsu.2023.1.2. EDN:EXXQQO
30. Batskikh A.V., Drovnikova I.G., Rogozin E.A. On the issue of using a new information technology related to additional authentication of access subjects using keyboard handwriting in information protection systems against unauthorized access at information objects of internal affairs bodies. The Bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2020;2:21‒33. (in Russ.) EDN:DDVYPU
31. Pashchenko D.V., Balzannikova E.A. Continuous keystroke dynamics user identification using state context representation. XXI Century: Resumes of the Past and Challenges of the Present plus. 2020;9(3(51)):74‒79. (in Russ.) DOI:10.46548/21vek-2020-0952-0012. EDN:MAJRDT
32.
Review
For citations:
Alotoum Y.A., Krasov A.V. Soft Biometrics for Authentication and Identification Hand Based on the Use of the Keyboard. Proceedings of Telecommunication Universities. 2024;10(6):55-67. (In Russ.) https://doi.org/10.31854/1813-324X-2024-10-6-55-67. EDN: BGOBWS