Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3098954.3104047acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics

Published: 29 August 2017 Publication History

Abstract

In this paper, we propose a novel method, based on keystroke dynamics, to distinguish between fake and truthful personal information written via a computer keyboard. Our method does not need any prior knowledge about the user who is providing data. To our knowledge, this is the first work that associates the typing human behavior with the production of lies regarding personal information. Via experimental analysis involving 190 subjects, we assess that this method is able to distinguish between truth and lies on specific types of autobiographical information, with an accuracy higher than 75%. Specifically, for information usually required in online registration forms (e.g., name, surname and email), the typing behavior diverged significantly between truthful or untruthful answers. According to our results, keystroke analysis could have a great potential in detecting the veracity of self-declared information, and it could be applied to a large number of practical scenarios requiring users to input personal data remotely via keyboard.

References

[1]
J. R. Douceur, "The sybil attack," in Proc. of IPTPS. Springer, 2002.
[2]
M. Conti, R. Poovendran, and M. Secchiero, "Fakebook: Detecting fake profiles in on-line social networks," in Proc. of IEEE ASONAM, 2012.
[3]
N. Jong, "Why the number of people creating fake accounts and using second identity on facebook are increasing," tinyurl.com/3uwq75x, 2010.
[4]
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro, "Aiding the detection of fake accounts in large scale social online services," in Proc. of USENIX NSDI, 2012.
[5]
L. Jin, H. Takabi, and J. B. Joshi, "Towards active detection of identity clone attacks on online social networks," in Proc. of acM CODASPY, 2011.
[6]
P. S. Teh, A. B.J. Teoh, and S. Yue, "A survey of keystroke dynamics biometrics," The Scientific World Journal, 2013.
[7]
G. Grimes, J. Jenkins, and J. Valacich, "Assessing credibility by monitoring changes in typing behavior: The keystroke dynamics deception detection model," in HICSS-46, 2013.
[8]
Y. Choi, "Keystroke patterns as prosody in digital writings: A case study with deceptive reviews and essays," EMNLP, 2014.
[9]
J. De Houwer, S. Teige-Mocigemba, A. Spruyt, and A. Moors, "Implicit measures: A normative analysis and review." APA Psychological bulletin, 2009.
[10]
J. J. Walczyk, F. P. Igou, A. P. Dixon, and T. Tcholakian, "Advancing lie detection by inducing cognitive load on liars: a review of relevant theories and techniques guided by lessons from polygraph-based approaches," 2013.
[11]
P. Chandler and J. Sweller, "Cognitive load theory and the format of instruction," Cognition and instruction, 1991.
[12]
B. Verschuere, G. Ben-Shakhar, and E. Meijer, Memory detection: Theory and application of the Concealed Information Test. Cambridge Univ. Press, 2011.
[13]
G. Sartori, S. Agosta, C. Zogmaister, S. D. Ferrara, and U. Castiello, "How to accurately detect autobiographical events," Psychological science, 2008.
[14]
G. Sartori, G. Orru, and M. Monaro, "Detecting deception through kinematic analysis of hand movement," International Journal of Psychophysiology, 2016.
[15]
M. Monaro, L. Gamberini, and G. Sartori, "The detection of faked identity using unexpected questions and mouse dynamics," PLoS ONE, 2017.
[16]
M. Monaro, F. I. Fugazza, L. Gamberini, and G. Sartori, How Human-Mouse Interaction can Accurately Detect Faked Responses About Identity. Springer, 2017.
[17]
M. Monaro, L. Gamberini, and G. Sartori, Identity Verification Using a Kinematic Memory Detection Technique. Springer, 2017.
[18]
R. Moskovitch, C. Feher, Messerman et al., "Identity theft, computers and behavioral biometrics," in Proc. of IEEE ISI, 2009.
[19]
R. Giot, M. El-Abed, and C. Rosenberger, "Greyc keystroke: a benchmark for keystroke dynamics biometric systems," in Proc. of IEEE BTAS, 2009.
[20]
R. S. Gaines, W. Lisowski, S.J. Press, and N. Shapiro, "Authentication by keystroke timing: Some preliminary results," DTIC Document, Tech. Rep., 1980.
[21]
F. Monrose and A. D. Rubin, "Keystroke dynamics as a biometric for authentication," Future Generation computer systems, 2000.
[22]
M. Rybnik, M. Tabedzki, and K. Saeed, "A keystroke dynamics based system for user identification," in Proc. of IEEE CISIM, 2008.
[23]
C. Epp, M. Lippold, and R. L. Mandryk, "Identifying emotional states using keystroke dynamics," in Proc. of ACM CHI, 2011.
[24]
L. M. Vizer, L. Zhou, and A. Sears, "Automated stress detection using keystroke and linguistic features: An exploratory study," Human-Computer Studies, 2009.
[25]
R. Mihalcea and C. Strapparava, "The lie detector: Explorations in the automatic recognition of deceptive language," in Proc. of ACL IJCNLP, 2009.
[26]
M. Ott, Y Choi, C. Cardie, and J. T. Hancock, "Finding deceptive opinion spam by any stretch of the imagination," in Proc. of ACL HLT, 2011.
[27]
L. Zhou, "An empirical investigation of deception behavior in instant messaging," IEEE TPC, 2005.
[28]
D. C. Derrick, T. O. Meservy, J. L. Jenkins, J. K. Burgoon, and J. F. Nunamaker Jr, "Detecting deceptive chat-based communication using typing behavior and message cues," ACM TMIS, 2013.
[29]
C. M. Bishop, "Pattern recognition," Machine Learning, 2006.
[30]
L. Breiman, "Random forests," Machine learning, 2001.
[31]
D. L. Schacter, C.-Y. P. Chiu, and K. N. Ochsner, "Implicit memory: A selective review," Annual review of neuroscience, 1993.
[32]
R. Spolaor, Q. Li, M. Monaro, M. Conti, L. Gamberini, and G. Sartori, "Biometric authentication methods on smartphones: A survey," Psychnology Journal, 2017.
[33]
V.-D. Stanciu, R. Spolaor, M. Conti, and C. Giuffrida, "On the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks," in Proc. of ACM CODASPY, 2016.

Cited By

View all
  • (2024)Towards Understanding Emotions for Engaged Mental Health ConversationsCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3663694(176-180)Online publication date: 1-Jul-2024
  • (2024)Spotting Fake Profiles in Social Networks via Keystroke Dynamics2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454821(525-533)Online publication date: 6-Jan-2024
  • (2022)A Comprehensive Review on Features Extraction and Features Matching Techniques for Deception DetectionIEEE Access10.1109/ACCESS.2022.315782110(28233-28246)Online publication date: 2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
August 2017
853 pages
ISBN:9781450352574
DOI:10.1145/3098954
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Lie detection
  2. cybersecurity
  3. fake accounts
  4. keyboard interaction
  5. keystroke dynamics

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES '17
ARES '17: International Conference on Availability, Reliability and Security
August 29 - September 1, 2017
Reggio Calabria, Italy

Acceptance Rates

ARES '17 Paper Acceptance Rate 100 of 191 submissions, 52%;
Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Towards Understanding Emotions for Engaged Mental Health ConversationsCompanion Publication of the 2024 ACM Designing Interactive Systems Conference10.1145/3656156.3663694(176-180)Online publication date: 1-Jul-2024
  • (2024)Spotting Fake Profiles in Social Networks via Keystroke Dynamics2024 IEEE 21st Consumer Communications & Networking Conference (CCNC)10.1109/CCNC51664.2024.10454821(525-533)Online publication date: 6-Jan-2024
  • (2022)A Comprehensive Review on Features Extraction and Features Matching Techniques for Deception DetectionIEEE Access10.1109/ACCESS.2022.315782110(28233-28246)Online publication date: 2022
  • (2022)Detecting deception through facial expressions in a dataset of videotaped interviewsComputers in Human Behavior10.1016/j.chb.2021.107063127:COnline publication date: 9-Apr-2022
  • (2020)Detecting Identity Deception in Online Context: A Practical Approach Based on Keystroke DynamicsAdvances in Human Factors in Cybersecurity10.1007/978-3-030-52581-1_6(41-48)Online publication date: 4-Jul-2020
  • (2020)Using Blink Rate to Detect Deception: A Study to Validate an Automatic Blink Detector and a New Dataset of Videos from Liars and Truth-TellersHuman-Computer Interaction. Human Values and Quality of Life10.1007/978-3-030-49065-2_35(494-509)Online publication date: 19-Jul-2020
  • (2020)Keyboard dynamics discrepancies between baseline and deceptive eyewitness narrativesApplied Cognitive Psychology10.1002/acp.374335:1(112-122)Online publication date: 8-Oct-2020
  • (2019)Vulnerability of Adaptive Strategies of Keystroke Dynamics Based Authentication Against Different Attack Types2019 International Conference on Cyberworlds (CW)10.1109/CW.2019.00052(274-278)Online publication date: Oct-2019
  • (2018)Spotting faked identities via mouse dynamics using complex questionsProceedings of the 32nd International BCS Human Computer Interaction Conference10.14236/ewic/HCI2018.8(1-9)Online publication date: 4-Jul-2018
  • (2018)The Online Identity Detection via Keyboard DynamicsProceedings of the Future Technologies Conference (FTC) 201810.1007/978-3-030-02683-7_24(342-357)Online publication date: 20-Oct-2018

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media