ABSTRACT
We study the performance and influence of various keystroke features on keystroke dynamics authentication systems. In particular, we investigate the performance of keystroke features on a subset of most frequently used English words. Four features including key duration, flight time latency, diagraph time latency, and word total time duration were analyzed using non-parametric Wilcoxon Man-Whitney statistical test technique. Two experiments were performed to measure the performance of each feature individually as well as the results from the combinations of these features. The results of the experiments were evaluated with eight users. The results show that while the combination of hold time and word total duration produces best performance among all four keystroke features combinations, hold time of the key press offers the optimal result if used independently.
- Cryptanalysis: A Study of Ciphers and Their Solution. Dover Publications, Dover, New York, 1989. Google ScholarDigital Library
- L. C. Araujo, J. Sucupira, Luiz, M. G. Lizarraga, L. L. Ling, and J. B. Yabu-uti. User authentication through typing biometrics features. In Biometric Authentication, volume 3072, pages 694--700. 2004.Google ScholarCross Ref
- F. Bergadano, D. Gunetti, and C. Picardi. User authentication through keystroke dynamics. ACM Trans. Inf. Syst. Secur., 5(4):367--397, Nov. 2002. Google ScholarDigital Library
- E. Fry, J. Kress, and D. Fountoukidis. The Reading Teachers Book of Lists. Jossey-Bass, 3rd edition, 2000.Google Scholar
- D. Gunetti and C. Picardi. Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur., 8(3):312--347, 2005. Google ScholarDigital Library
- K. Killourhy and R. Maxion. Why did my detector do that?!: Predicting keystroke-dynamics error rates. In Proceedings of the 13th International Conference on Recent Advances in Intrusion Detection (RAID'10), pages 256--276. Springer-Verlag, 2010. Google ScholarDigital Library
- F. Monrose and A. D. Rubin. Keystroke dynamics as a biometric for authentication. Future Generation Comp. Syst., 16(4):351--359, 2000. Google ScholarDigital Library
- J. A. Robinson, V. M. Liang, J. A. M. Chambers, and C. L. MacKenzie. Computer user verification using login string keystroke dynamics. IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 28(2):236--241, March 1998. Google ScholarDigital Library
- P. S. Tech, S. Yue, and A. B. Teoh. Feature fusion approach on keystroke dynamics efficiency enhancement. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 1(1), 2012.Google Scholar
Index Terms
- The accuracy of user authentication through keystroke features using the most frequent words
Recommendations
Keystroke Active Authentications Based on Most Frequently Used Words
IWSPA '15: Proceedings of the 2015 ACM International Workshop on International Workshop on Security and Privacy AnalyticsThe aim of this research is to advance the user active authentication technology using keystroke dynamics. Through this research, we assess the performance and influence of various keystroke features on keystroke dynamics authentication systems. In ...
Unconstrained keystroke dynamics authentication with shared secret
Among all the existing biometric modalities, authentication systems based on keystroke dynamics present interesting advantages. These solutions are well accepted by users and cheap as no additional sensor is required for authenticating the user before ...
Continuous user authentication using multi-modal biometrics
As modern mobile devices increase in their capability and accessibility, they introduce additional demands in terms of security - particularly authentication. With the widely documented poor use of PINs, Active Authentication is designed to overcome the ...
Comments