Risk Roundup

A Machine Learning Approach to Keystroke Dynamics-Based User Authentication


Listen Later

Prof. (Dr.) Sérgio Tenreiro de Magalhães, an Associate Professor and Chair of Cybersecurity at Champlain College Online based in the United States, participates in Risk Roundup to discuss a Machine Learning Approach to Keystroke Dynamics based User Authentication.

Risk Roundup Webcast: A Machine Learning Approach to Keystroke Dynamics Based User Authentication

A Machine Learning Approach to Keystroke Dynamics-Based User Authentication

Over the years, nations’ traditional approach to cybersecurity has been the use of passwords and password-based authentication. Passwords have undoubtedly provided cyberspace-based digital systems and platforms with a not so strong barrier to accessing what was quite safe in the analog world so far. However, since the digital age and the advances in computing provided the means to quickly try hundreds of thousands of passwords in a short time, the password-based authentication system is no longer considered safe and secure.

Since hacking passwords have become relatively simple, it is no surprise that we need the effectiveness of strong authentication systems for digital identity and age. Understandably, a new approach to identity authentication has become essential.

Current State

The majority of computer systems across nations

today employ a login ID and password as the principal method for access
security. It needs to be understood that, in stand-alone situations, this level
of protection may be adequate. However, when computers are connected to the
internet, the vulnerability to a security breach is increased enormously.

Since it is becoming clear that we need more

reliable processes of authentication, it is essential to evaluate the common authentication
solutions used today:

  • What
are the common authentication solutions?
  • Will
  • any alternative to text-based password, for instance, graphical passwords, can
    enhance the level of security of trusted computer systems?
  • In
  • the context of Information Systems (IS), what does authentication involve?
  • What
  • kind of biometric solutions are emerging?
  • Which
  • class of biometrics will provide a high level of security?

    Keystroke Dynamics

    Keystroke dynamics is a behavioral biometric

    that is based on how a user enters their login details. This
    collection of attributes is then used to form a reference signature, a
    biometrics identification record that can be used for subsequent authentication
    requests.

    The core of the keystroke dynamics is the

    typing style of a user, the typing style that includes such factors as the
    length of time it takes to type the login id/password, how long each individual
    depresses a key, and how long it takes to type successive keys. By collecting
    all these data– it is possible to develop a model of how the person types. Since
    this is not a one-time exercise, in addition to this static information, a
    person’s typing style evolves with continued practice and usage and can be adequately
    quantified.

    Since keystroke-based behavior biometrics is not a one-time collection of behavioral biometric data, it is critical to evaluate whether the ongoing need for exercise creates any opening for manipulation and other vulnerabilities.  

    • How is the data collected for behavioral-based biometrics?
    • Once the keystroke data has been collected, how is the reference signature obtained for users?
    • How is the profile of a user-built?
    • Where are the research efforts headed to keystroke dynamics authentication algorithms?
    • Since the user identification and authentication are significant security concerns on all kind of computational systems, how will the improved statistical keystroke dynamics algorithm resolve user identification and authentication problem?
    • What is the precision of keystroke-based authentication technology?
    • What is the processing capability of the keystroke algorithm?
    • How would the keystroke system prevent illegitimate login attempts?
    • On what devices can this keystroke biometry be used?
    • What protocols need to be followed for developing a web-based application with an authentication system based on static keystroke dynamics?
    • What does keystroke authentication involve?
    • What is the machine learning approach to keystroke dynamics?
    • Will the keystroke technology be feasible for large scale implementation?
    • Is this technology sufficient to be a stand-alone authentication technology?
    • What technical/non-technical challenges still need to be resolved before the keystroke technology can be applied commercially?

    The time is now to begin a discussion on all these questions and more as we start to evaluate a machine learning approach to keystroke dynamics-based authentication solutions.

    For more, please watch the Risk Roundup Webcast or hear the Risk Roundup Podcast

    About the Guest

    Dr. Sérgio

    Tenreiro de Magalhães
    is an Associate Professor and Chair of Cybersecurity at Champlain College Online. He has taught courses
    in a range of information security disciplines internationally for over a
    decade.

    Dr. Tenreiro de Magalhães is a member and

    reviewer of a number of organizations, including the NATO Multinational Cyber
    Defense Education and Training project and the Editorial Committee of the
    International Journal of Electronic Security and Digital Forensics. His
    research interests focus on information security, intelligence, and performance
    monitoring. His research on security-related topics is widely published.

    About the Host of Risk Roundup

    Jayshree Pandya (née Bhatt), Ph.D., is a leading expert at the

    intersection of science, technology, and security and is the Founder and Chief
    Executive Officer of Risk Group LLC. She has been involved in a wide range of
    research, spanning security of and from science and technology domains. Her
    work is currently focused on understanding how converging technologies and
    their interconnectivity across cyberspace, aquaspace, geospace, and space
    (CAGS), as well as individuals and entities across nations: their governments,
    industries, organizations, and academia (NGIOA), create survival, security, and
    sustainability risks. This research is pursued to provide strategic security
    solutions for the future of humanity. From the National Science Foundation to
    organizations from across the United States, Europe, and Asia, Dr. Pandya is an
    invited speaker on emerging technologies, technology transformation, digital
    disruption, and strategic security risks. Her work has contributed to more than
    100 publications in the areas of science and commerce. She is the author of the
    books, Geopolitics of
    Cybersecurity and The Global Age. She writes about Artificial
    Intelligence on Forbes.

    About Risk Roundup

    Risk Roundup, a global initiative launched by

    Risk Group, is a security risk reporting for risks emerging from existing and
    emerging technologies, technology convergence, and transformation happening
    across cyberspace, aquaspace, geospace, and space. Risk Roundup is released in
    both audio (Podcast) and video (Webcast) format. It is available for
    subscription at (Risk Group
    Website, iTunesGoogle
    Play, Stitcher RadioAndroid, and Risk Group
    Professional Social Media).

    About Risk Group

    Risk

    Group is a Strategic Security Risk Research Platform and Community. Risk Group’s
    Strategic Security Community and Ecosystem is the first and only
    cross-disciplinary and collective community that is made of top scientists,
    security professionals, thought leaders, entrepreneurs, philanthropists,
    policymakers, and academic institutions from across nations collaborating to
    research, review, rate and report strategic security risks to protect the
    future of humanity.

    Copyright Risk Group LLC. All Rights Reserved

    The post A Machine Learning Approach to Keystroke Dynamics-Based User Authentication appeared first on Risk Group.

    ...more
    View all episodesView all episodes
    Download on the App Store

    Risk RoundupBy Risk Group

    • 4
    • 4
    • 4
    • 4
    • 4

    4

    4 ratings