Adedeji Adegbenle et al, International Journal of Computer Science and Mobile Computing, Vol.13 Issue.10, October- 2024, pg. 1-11
© 2024, IJCSMC All Rights Reserved, ZAIN Publicaons, Fridhemsgatan 62, 112 46, Stockholm, Sweden 1
Available Online at www.ijcsmc.com
International Journal of Computer Science and Mobile Computing
A Monthly Journal of Computer Science and Information Technology
ISSN 2320–088X
IMPACT FACTOR: 7.056
IJCSMC, Vol. 13, Issue. 10, October 2024, pg.1 – 11
A Secured Keystroke-Based Model for
Preventing Social Engineering Attacks
using Recurrent Neural Network
Adedeji Adegbenle
1
; Oludele Awodele
2
; Chibueze Ogbonna
3
; Taiwo Adigun
4
1,2,3
Computer Science Department, School of Computing and Engineering Sciences, Babcock University, Ilishan-
Remo, Ogun State Nigeria
4
Software Engineering Department, School of Computing and Engineering Sciences, Babcock University, Ilishan-
Remo, Ogun State Nigeria
1
adegbenle0099@pg.babcock.edu.ng;
2
awodeleo@babcock.edu.ng;
3
ogbonnac@babcock.edu.ng;
4
adigunt@babcock.edu.ng
DOI: https://doi.org/10.47760/ijcsmc.2024.v13i10.001
Abstract: Among several authentication problems, preventing social engineering attacks using behavioural biometric
approach has not received the required attention especially with focus on keystroke dynamics. This study aims to leverage the
power of deep learning for more accurate and robust continuous authentication based on typing patterns. The proposed
framework for this study utilized deep learning algorithm for behavioural biometrics authentication using Keystroke
dynamics. The deep learning model was developed using Recurrent Neural Network (RNN) algorithm and was optimized was
to obtain a better performance with Bayesian optimization which, eventually enhanced the model's accuracy. The dataset was
split into training and testing in the model design phase and some hyperparameters such as dense, activation, batch size,
sigmoid, filament, input size and epoch were used and optimized for building the deep learning algorithm. The RNN model is
used to generate the evaluation metrics such as log loss, accuracy, precision and recall. The result presented the accuracy,
precision, recall, and loss function as 100%, 100%, 100%, and 36% respectively for optimized model. The cost metrics yielded
0.0032, 0.0032, and 0.0006 MAE, MSE, and RMSE respectively. The developed KBB shows high level of social engineering
attacks mitigation in comparison with the existing solution from the performance measure results.
KEYWORDS: Behavioural Biometrics, Keystroke Dynamics, Recurrent Neural Networks, Keylogging, Optimization