Analysis of the Combination of Naïve Bayes and MHR (Mean of Horner’s Rule) for Classification of Keystroke Dynamic Authentication

Authors

  • Zamah Sari Department of Informatics, University of Muhammadiyah Malang, Indonesia
  • Didih Rizki Chandranegara Department of Informatics, University of Muhammadiyah Malang, Indonesia
  • Rahayu Nurul Khasanah Department of Informatics, University of Muhammadiyah Malang, Indonesia
  • Hardianto Wibowo Department of Informatics, University of Muhammadiyah Malang, Indonesia
  • Wildan Suharso Department of Informatics, University of Muhammadiyah Malang, Indonesia

DOI:

https://doi.org/10.15575/join.v7i1.839

Keywords:

Keystroke Dynamic Authentication, Classification, Naïve Bayes, Mean of Horner’s Rule

Abstract

Keystroke Dynamics Authentication (KDA) is a technique used to recognize somebody dependent on typing pattern or typing rhythm in a system. Everyone's typing behavior is considered unique. One of the numerous approaches to secure private information is by utilizing a password. The development of technology is trailed by the human requirement for security concerning information and protection since hacker ability of information burglary has gotten further developed (hack the password). So that hackers can use this information for their benefit and can disadvantage others. Hence, for better security, for example, fingerprint, retina scan, et cetera are enthusiastically suggested. But these techniques are considered costly. The advantage of KDA is the user would not realize that the system is using KDA. Accordingly, we proposed the combination of Naïve Bayes and MHR (Mean of Horner’s Rule) to classify the individual as an attacker or a nonattacker. We use Naïve Bayes because it is better for classification and simple to implement than another. Furthermore, MHR is better for KDA if combined with the classification method which is based on previous research. This research showed that False Acceptance Rate (FAR) and Accuracy are improving than the previous research.

References

B. S. Saini, N. Kaur, and K. S. Bhatia, “Keystroke dynamics based user authentication using numeric keypad,” Proc. 7th Int. Conf. Conflu. 2017 Cloud Comput. Data Sci. Eng., pp. 25–29, 2017, doi: 10.1109/CONFLUENCE.2017.7943118.

Y. Muliono, H. Ham, and D. Darmawan, “Keystroke Dynamic Classification using Machine Learning for Password Authorization,” Procedia Comput. Sci., vol. 135, pp. 564–569, 2018, doi: 10.1016/j.procs.2018.08.209.

M. M. Hoobi, “Keystroke Dynamics Authentication based on Naïve Bayes Classifier 2015. 1184,–1176 .pp 2, .no 56, .vol” ,

D. R. Chandranegara, H. Wibowo, and A. E. Minarno, “Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 18, no. 2, pp. 770–775, 2020, doi: 10.12928/TELKOMNIKA.v18i2.14815.

Z. M. Fadhil, “Hybrid of K-means clustering and naive Bayes classifier for predicting performance of an employee,” Period. Eng. Nat. Sci., vol. 9, no. 2, pp. 799–807, 2021, doi: 10.21533/pen.v9i2.1898.

V. Vanitha and D. Akila, “Image Segmentation and classification Hepatitis viral infection in human blood smear with a hybrid algorithm combining Naive Bayes Classifier Input Image Image preprocessing Random Forest Naive Bayes Classifier Feature extraction Clustering Image Result,” vol. 12, no. 11, pp. 5873–5881, 2021.

M. Wahyudi and A. Andriani, “Application of C4.5 and Naïve Bayes Algorithm for Detection of Potential Increased Case Fatality Rate Diarrhea,” J. Phys. Conf. Ser., vol. 1830, no. 1, pp. 0–12, 2021, doi: 10.1088/1742-6596/1830/1/012016.

K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” Proc. Int. Conf. Dependable Syst. Networks, pp. 125–134, 2009, doi: 10.1109/DSN.2009.5270346.

Y. Zhong, Y. Deng, and A. K. Jain, “Keystroke dynamics for user authentication,” IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit. Work., no. June, pp. 117–123, 2012, doi: 10.1109/CVPRW.2012.6239225.

Z. E. Rasjid and R. Setiawan, “Performance Comparison and Optimization of Text Document Classification using kNN and Naïve Bayes Classification Techniques,” Procedia Comput. Sci., vol. 116, pp. 107–112, 2017, doi: 10.1016/j.procs.2017.10.017.

T. Anusas-Amornkul, “Strengthening password authentication using keystroke dynamics and smartphone sensors,”ACM Int. Conf. Proceeding Ser., pp. 70–74, 2019, doi: 10.1145/3357419.3357425.

M. S. Mubarok, A. Adiwijaya, and M. D. Aldhi, “Aspect-based sentiment analysis to review products using Naïve Bayes,” AIP Conf. Proc., vol. 1867, 2017, doi: 10.1063/1.4994463.

L. Dey, S. Chakraborty, A. Biswas, B. Bose, and S. Tiwari, “Sentiment Analysis of Review Datasets Using Naïve Bayes‘ and K-NN Classifier,” Int. J. Inf. Eng. Electron. Bus., vol. 8, no. 4, pp. 54–62, 2016, doi: 10.5815/ijieeb.2016.04.07.

O. A.-M. A. H. Mohammad, T. Alwada’n, “Arabic Text Categorization Using Support vector machine, Naïve Bayes and Neural Network Adel,” GSTF J. Comput., vol. Volume 5, no. 1, pp. 40–44, 2016, doi: 10.5176/2251-3043.

N. F. Rusland, N. Wahid, S. Kasim, and H. Hafit, “Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets,” IOP Conf. Ser. Mater. Sci. Eng., vol. 226, no. 1, 2017, doi: 10.1088/1757-899X/226/1/012091.

R. Joyce and G. Gupta, “Identity Authentication Based on Keystroke Latencies,” Commun. ACM, vol. 33, no. 2, pp.168–176, 1990, doi: 10.1145/75577.75582.

W. YANG and F. FANG, “Application of a Dynamic Identity Authentication Model Based on an Improved Keystroke Rhythm Algorithm,” Int. J. Commun. Netw. Syst. Sci., vol. 02, no. 08, pp. 714–719, 2009, doi: 10.4236/ijcns.2009.28082.

Downloads

Published

2022-06-30

Issue

Section

Article

Citation Check

Most read articles by the same author(s)