Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Keystroke dynamics is the process to identify or authenticate individuals based on the typing rhythm behaviors. There are many classifications proposed to check the user's legitimacy, and therefore we should make it clear how they perform in order to confirm promising research direction. Nevertheless, these researches provide experiments in different situations such as datasets, conditions and methodologies as well. This paper aims to benchmark the algorithms in the same dataset and feature in order to measure the performance on an equal level. Using dataset containing 51 subjects' typing rhythm, we implemented and evaluated 13 classifiers measured by F1-measure. We also develop a way to process the typing data, and test it on these algorithms. Considering the case that the model should reject outlander, we test the algorithms on open set. The top-performing classifier achieves F1-measure rates 0.92 when using 50 subjects' typing normalized data to train and the remaining one to test. The results, along with the normalization methodology, constitute a benchmark for comparing classifiers and measuring performance of keystroke dynamics for insider detection.

Original languageEnglish
Title of host publicationProceedings of the ACM Turing 50th Celebration Conference - China, ACM TUR-C 2017
PublisherAssociation for Computing Machinery
ISBN (Electronic)9781450348737
DOIs
StatePublished - 12 May 2017
Event50th ACM Turing Conference - China, ACM TUR-C 2017 - Shanghai, China
Duration: 12 May 201714 May 2017

Publication series

NameACM International Conference Proceeding Series
VolumePart F127754

Conference

Conference50th ACM Turing Conference - China, ACM TUR-C 2017
Country/TerritoryChina
CityShanghai
Period12/05/1714/05/17

Keywords

  • F1-measure
  • Insider identification
  • Keystroke dynamics
  • Normalization

Fingerprint

Dive into the research topics of 'Performance evaluation of anomaly-detection algorithm for keystroke-typing based insider detection'. Together they form a unique fingerprint.

Cite this