
 
light of the fact that insider attacks has been 
increasing. Consequently, methods of continuous 
user authentication became an issue of growing 
concern. In general, these methods can recognize an 
intruder by identifying deviations in the normal 
behavior pattern of a user in a system. 
In this paper, by employing the pattern 
recognition potential of neural networks, it was 
proposed a method for continuous user 
authentication based on keystroke dynamics. 
Nonetheless, the sensitiveness of traditional training 
algorithms to initial conditions is a well-known 
problem in neural network applications. In order to 
deal with this problem, we tested the application of 
evolutionary neural networks based on both 
Darwinian and Lamarckian evolution. As it could be 
observed, if one considers that training time is not a 
limiting factor, since training may be performed 
once per user, a Lamarckian evolutionary training 
algorithm is an appropriate choice. Nonetheless, the 
use of evolutionary algorithms implies the need of 
adjusting an increased number of parameters. 
In our experiments, biometric rates (FAR and 
FRR) were enhanced by the hybrid approaches 
(evolutionary training) over a traditional single back 
propagation. Besides that, evolutionary artificial 
neural networks provide a more reliable training, as 
they are less likely to select an inappropriate set of 
weights, when compared to a simple set of random 
values. 
In future works, we intend to extract and analyze 
other features from the keystroke dynamics in order 
to select a set of features which allows a greater 
differentiation between legitimate users and 
intruders. Apart from that, additional behavior 
features (e.g. mouse dynamics) can be explored to 
improve the overall system performance. 
ACKNOWLEDGEMENTS 
The authors would like to thank Dr. Luciana Kassab 
(FATEC-SP) for her help, and CNPq (grant 
304322/2009-1) and FAT for financial support. 
REFERENCES 
Ahmed, A. A. E., Traore, I., Almulhem, A., 2008. Digital 
Fingerprint Based on Keystroke Dynamics. In: 
Proceedings of the Second International Symposium 
on Human Aspects of Information Security & 
Assurance. 
Braga,  A. P.,   Carvalho,  A. C. P. L. F.,  Ledermir,  T. B., 
2007.  Artificial Neural Networks. (in Portuguese) 
LTC. 
Castillo, P. A., Arenas, M. G., Castellano, J. G., Merelo, J. 
J., Prieto, A., Rivas, V., Romero, G., 2006. 
Lamarckian Evolution and the Baldwin Effect in 
Evolutionary Neural Networks. Computing Research 
Repository (CoRR). 
Cortez, P., Rocha, M., Neves, J., 2002. A Lamarckian 
Approach for Neural Network Training. Neural 
Processing Letters, Vol. 15. Springer. 
Cho, S., Han, C., Han, D. H., Kim, H., 2000. Web-Based 
Keystroke Dynamics Identity Verification Using 
Neural Network. In: Journal of Organizational 
Computing and Electronic Commerce, Vol. 10. Taylor 
& Francis. 
De Castro, L. N., 2006. Fundamentals of Natural 
Computing. Chapman & Hall/CRC. 
Di Pietro, R., Mancini, L. V., 2008. Intrusion Detection 
Systems. Series: Advances in Information Security - 
Vol. 38. Springer. 
Duserick, W., 2004. Whitepaper on Liberty Protocol and 
Identity Theft. Liberty Alliance Project. 
Elftmann, P., 2006. Secure Alternatives to Password-
based Authentication Mechanisms. Laboratory for 
Dependable Distributed Systems. RWTH Aachen 
University. 
Gaines, R., Lisowski, W., Press, S., Shapiro, N., 1980. 
Authentication by keystroke timing: Some preliminary 
results. Technical Report Rand report R-256-NSF. 
Rand corporation. 
Joyce, R., Gupta, G., 1990. Identity Authentication Based 
on Keystroke Latencies, Communications of the ACM, 
v. 33, p. 168-176. 
Kolen, J. F., Pollack, J. B., 1990. Back Propagation is 
Sensitive to Initial Conditions. Laboratory for 
Artificial Intelligence Research. The Ohio State 
University. 
Kowalski, E., Cappelli, D., 2008. Insider Threat Study: 
Illicit Cyber Activity in the Information Technology 
and Telecommunications Sector. Software 
Engineering Institute, Carnegie Mellon. 
Ku, K. W. C., Mak, M. W., Siu, W. C, 2003. Approaches 
to Combining Local and Evolutionary Search for 
Training Neural Networks: A Review and Some New 
Results. In A. Ghosh and S. Tsutsui, editors, Advances 
in Evolutionary Computation. Springer-Verlag. 
Richardson, R., 2003. CSI/FBI Computer Crime and 
Security Survey. Computer Security Institute. 
Sang, Y., Shen, H., Fan, P., 2004. Novel Impostors 
Detection in Keystroke Dynamics by Support Vector 
Machine. Parallel and Distributed Computing: 
Applications and Technologies, Vol. 3320/2005. 
Springer, Heidelberg. 
Wang, L., Geng, X., 2009. Behavioral Biometrics for 
Human Identification. Medical Information Science 
Reference. IGI Global. 
Windley
, P. J., 2005. Digital Identity. O'Reilly Media. 
Yao, X., 1999. Evolving artificial neural networks. In: 
Proceedings of the IEEE, 87(9):1423-1447. IEEE 
Press. 
ICEC 2010 - International Conference on Evolutionary Computation
364