skip to main content
10.1145/2602087.2602102acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

The accuracy of user authentication through keystroke features using the most frequent words

Published:08 April 2014Publication History

ABSTRACT

We study the performance and influence of various keystroke features on keystroke dynamics authentication systems. In particular, we investigate the performance of keystroke features on a subset of most frequently used English words. Four features including key duration, flight time latency, diagraph time latency, and word total time duration were analyzed using non-parametric Wilcoxon Man-Whitney statistical test technique. Two experiments were performed to measure the performance of each feature individually as well as the results from the combinations of these features. The results of the experiments were evaluated with eight users. The results show that while the combination of hold time and word total duration produces best performance among all four keystroke features combinations, hold time of the key press offers the optimal result if used independently.

References

  1. Cryptanalysis: A Study of Ciphers and Their Solution. Dover Publications, Dover, New York, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. C. Araujo, J. Sucupira, Luiz, M. G. Lizarraga, L. L. Ling, and J. B. Yabu-uti. User authentication through typing biometrics features. In Biometric Authentication, volume 3072, pages 694--700. 2004.Google ScholarGoogle ScholarCross RefCross Ref
  3. F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367--397, Nov. 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Fry, J. Kress, and D. Fountoukidis. The Reading Teachers Book of Lists. Jossey-Bass, 3rd edition, 2000.Google ScholarGoogle Scholar
  5. D. Gunetti and C. Picardi. Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur., 8(3):312--347, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. K. Killourhy and R. Maxion. Why did my detector do that?!: Predicting keystroke-dynamics error rates. In Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection (RAID'10), pages 256--276. Springer-Verlag, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. F. Monrose and A. D. Rubin. Keystroke dynamics as a biometric for authentication. Future Generation Comp. Syst., 16(4):351--359, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie. Computer user verification using login string keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 28(2):236--241, March 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. S. Tech, S. Yue, and A. B. Teoh. Feature fusion approach on keystroke dynamics efficiency enhancement. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(1), 2012.Google ScholarGoogle Scholar

Index Terms

  1. The accuracy of user authentication through keystroke features using the most frequent words

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CISR '14: Proceedings of the 9th Annual Cyber and Information Security Research Conference
      April 2014
      134 pages
      ISBN:9781450328128
      DOI:10.1145/2602087

      Copyright © 2014 Owner/Author

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 April 2014

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CISR '14 Paper Acceptance Rate32of50submissions,64%Overall Acceptance Rate69of136submissions,51%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader