Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication
DOI:
https://doi.org/10.15575/join.v7i1.839Keywords:
Keystroke Dynamic Authentication, Classification, Naïve Bayes, Mean of Horner’s RuleAbstract
Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a nonattacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.
References
B. S. Saini, N. Kaur, and K. S. Bhatia, “Keystroke dynamics based user authentication using numeric keypad,” Proc. 7th Int. Conf. Conflu. 2017 Cloud Comput. Data Sci. Eng., pp. 25–29, 2017, doi: 10.1109/CONFLUENCE.2017.7943118.
Y. Muliono, H. Ham, and D. Darmawan, “Keystroke Dynamic Classification using Machine Learning for Password Authorization,” Procedia Comput. Sci., vol. 135, pp. 564–569, 2018, doi: 10.1016/j.procs.2018.08.209.
M. M. Hoobi, “Keystroke Dynamics Authentication based on Naïve Bayes Classifier 2015. 1184,–1176 .pp 2, .no 56, .vol” ,
D. R. Chandranegara, H. Wibowo, and A. E. Minarno, “Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 18, no. 2, pp. 770–775, 2020, doi: 10.12928/TELKOMNIKA.v18i2.14815.
Z. M. Fadhil, “Hybrid of K-means clustering and naive Bayes classifier for predicting performance of an employee,” Period. Eng. Nat. Sci., vol. 9, no. 2, pp. 799–807, 2021, doi: 10.21533/pen.v9i2.1898.
V. Vanitha and D. Akila, “Image Segmentation and classification Hepatitis viral infection in human blood smear with a hybrid algorithm combining Naive Bayes Classifier Input Image Image preprocessing Random Forest Naive Bayes Classifier Feature extraction Clustering Image Result,” vol. 12, no. 11, pp. 5873–5881, 2021.
M. Wahyudi and A. Andriani, “Application of C4.5 and Naïve Bayes Algorithm for Detection of Potential Increased Case Fatality Rate Diarrhea,” J. Phys. Conf. Ser., vol. 1830, no. 1, pp. 0–12, 2021, doi: 10.1088/1742-6596/1830/1/012016.
K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” Proc. Int. Conf. Dependable Syst. Networks, pp. 125–134, 2009, doi: 10.1109/DSN.2009.5270346.
Y. Zhong, Y. Deng, and A. K. Jain, “Keystroke dynamics for user authentication,” IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. Work., no. June, pp. 117–123, 2012, doi: 10.1109/CVPRW.2012.6239225.
Z. E. Rasjid and R. Setiawan, “Performance Comparison and Optimization of Text Document Classification using kNN and Naïve Bayes Classification Techniques,” Procedia Comput. Sci., vol. 116, pp. 107–112, 2017, doi: 10.1016/j.procs.2017.10.017.
T. Anusas-Amornkul, “Strengthening password authentication using keystroke dynamics and smartphone sensors,”ACM Int. Conf. Proceeding Ser., pp. 70–74, 2019, doi: 10.1145/3357419.3357425.
M. S. Mubarok, A. Adiwijaya, and M. D. Aldhi, “Aspect-based sentiment analysis to review products using Naïve Bayes,” AIP Conf. Proc., vol. 1867, 2017, doi: 10.1063/1.4994463.
L. Dey, S. Chakraborty, A. Biswas, B. Bose, and S. Tiwari, “Sentiment Analysis of Review Datasets Using Naïve Bayes‘ and K-NN Classifier,” Int. J. Inf. Eng. Electron. Bus., vol. 8, no. 4, pp. 54–62, 2016, doi: 10.5815/ijieeb.2016.04.07.
O. A.-M. A. H. Mohammad, T. Alwada’n, “Arabic Text Categorization Using Support vector machine, Naïve Bayes and Neural Network Adel,” GSTF J. Comput., vol. Volume 5, no. 1, pp. 40–44, 2016, doi: 10.5176/2251-3043.
N. F. Rusland, N. Wahid, S. Kasim, and H. Hafit, “Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets,” IOP Conf. Ser. Mater. Sci. Eng., vol. 226, no. 1, 2017, doi: 10.1088/1757-899X/226/1/012091.
R. Joyce and G. Gupta, “Identity Authentication Based on Keystroke Latencies,” Commun. ACM, vol. 33, no. 2, pp.168–176, 1990, doi: 10.1145/75577.75582.
W. YANG and F. FANG, “Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm,” Int. J. Commun. Netw. Syst. Sci., vol. 02, no. 08, pp. 714–719, 2009, doi: 10.4236/ijcns.2009.28082.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2022 Jurnal Online Informatika
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License