Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour

Idoia Eizagirre, L. Segurola, Francesco Zola, Raul Orduna
{"title":"Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour","authors":"Idoia Eizagirre, L. Segurola, Francesco Zola, Raul Orduna","doi":"10.1145/3571697.3571714","DOIUrl":null,"url":null,"abstract":"Digital security has become crucial in this new era of technology and biometry is becoming a natural and reliable authentication system. In recent years, keystroke dynamics, a type of behavioral biometric, has been used for user authentication and attack detection. In this study, we pursue a new approach to keystroke dynamics data generation focused on the impersonation of a user at the identification stage using Conditional Generative Adversarial Networks (cGAN). To that aim, three different architectures have been designed, implemented, and validated: a Vanilla-cGAN based on simple Neural Networks (NN), an LSTM-cGAN based on Recurrent Neural Networks using Long Short-Term Memory units (LSTM), and a CNN-cGAN based on Convolutional Neural Networks. These models have been validated in two different conditions, one in which the attacker knows exactly the order of the typed words for replicating the behavior and the other in which the order is unknown. To validate the data generated by these models, beyond the internal discriminator’s accuracy, a pre-trained Siamese Network has been used to detect whether two keystroke sequences belong to the same or not. This study suggests that the keystroke dynamics of a user can be successfully imitated via keystroke dynamics data generation using cGANs with different architectures.","PeriodicalId":400139,"journal":{"name":"Proceedings of the 2022 European Symposium on Software Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 European Symposium on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3571697.3571714","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Digital security has become crucial in this new era of technology and biometry is becoming a natural and reliable authentication system. In recent years, keystroke dynamics, a type of behavioral biometric, has been used for user authentication and attack detection. In this study, we pursue a new approach to keystroke dynamics data generation focused on the impersonation of a user at the identification stage using Conditional Generative Adversarial Networks (cGAN). To that aim, three different architectures have been designed, implemented, and validated: a Vanilla-cGAN based on simple Neural Networks (NN), an LSTM-cGAN based on Recurrent Neural Networks using Long Short-Term Memory units (LSTM), and a CNN-cGAN based on Convolutional Neural Networks. These models have been validated in two different conditions, one in which the attacker knows exactly the order of the typed words for replicating the behavior and the other in which the order is unknown. To validate the data generated by these models, beyond the internal discriminator’s accuracy, a pre-trained Siamese Network has been used to detect whether two keystroke sequences belong to the same or not. This study suggests that the keystroke dynamics of a user can be successfully imitated via keystroke dynamics data generation using cGANs with different architectures.
击键表示攻击:生成对抗网络替代用户行为
在这个新的技术时代,数字安全变得至关重要,生物识别技术正在成为一种自然可靠的认证系统。近年来,击键动力学作为一种行为生物识别技术,已被用于用户认证和攻击检测。在本研究中,我们采用一种新的方法来生成按键动力学数据,重点是使用条件生成对抗网络(cGAN)在识别阶段模拟用户。为此,设计、实现和验证了三种不同的架构:基于简单神经网络(NN)的Vanilla-cGAN,基于使用长短期记忆单元(LSTM)的递归神经网络的LSTM- cgan,以及基于卷积神经网络的CNN-cGAN。这些模型已经在两种不同的条件下进行了验证,在一种情况下,攻击者确切地知道用于复制行为的键入单词的顺序,而在另一种情况下,顺序是未知的。为了验证这些模型生成的数据,除了内部鉴别器的准确性之外,还使用预训练的暹罗网络来检测两个击键序列是否属于相同的序列。本研究表明,通过使用具有不同架构的cgan生成击键动力学数据,可以成功地模仿用户的击键动力学。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信