Idoia Eizagirre, L. Segurola, Francesco Zola, Raul Orduna
{"title":"Keystroke Presentation Attack: Generative Adversarial Networks for replacing user behaviour","authors":"Idoia Eizagirre, L. Segurola, Francesco Zola, Raul Orduna","doi":"10.1145/3571697.3571714","DOIUrl":null,"url":null,"abstract":"Digital security has become crucial in this new era of technology and biometry is becoming a natural and reliable authentication system. In recent years, keystroke dynamics, a type of behavioral biometric, has been used for user authentication and attack detection. In this study, we pursue a new approach to keystroke dynamics data generation focused on the impersonation of a user at the identification stage using Conditional Generative Adversarial Networks (cGAN). To that aim, three different architectures have been designed, implemented, and validated: a Vanilla-cGAN based on simple Neural Networks (NN), an LSTM-cGAN based on Recurrent Neural Networks using Long Short-Term Memory units (LSTM), and a CNN-cGAN based on Convolutional Neural Networks. These models have been validated in two different conditions, one in which the attacker knows exactly the order of the typed words for replicating the behavior and the other in which the order is unknown. To validate the data generated by these models, beyond the internal discriminator’s accuracy, a pre-trained Siamese Network has been used to detect whether two keystroke sequences belong to the same or not. This study suggests that the keystroke dynamics of a user can be successfully imitated via keystroke dynamics data generation using cGANs with different architectures.","PeriodicalId":400139,"journal":{"name":"Proceedings of the 2022 European Symposium on Software Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2022 European Symposium on Software Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3571697.3571714","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Digital security has become crucial in this new era of technology and biometry is becoming a natural and reliable authentication system. In recent years, keystroke dynamics, a type of behavioral biometric, has been used for user authentication and attack detection. In this study, we pursue a new approach to keystroke dynamics data generation focused on the impersonation of a user at the identification stage using Conditional Generative Adversarial Networks (cGAN). To that aim, three different architectures have been designed, implemented, and validated: a Vanilla-cGAN based on simple Neural Networks (NN), an LSTM-cGAN based on Recurrent Neural Networks using Long Short-Term Memory units (LSTM), and a CNN-cGAN based on Convolutional Neural Networks. These models have been validated in two different conditions, one in which the attacker knows exactly the order of the typed words for replicating the behavior and the other in which the order is unknown. To validate the data generated by these models, beyond the internal discriminator’s accuracy, a pre-trained Siamese Network has been used to detect whether two keystroke sequences belong to the same or not. This study suggests that the keystroke dynamics of a user can be successfully imitated via keystroke dynamics data generation using cGANs with different architectures.