Keypress Interval Timing Ratios as Behavioral Biometrics for Authentication in Computer Security

被引:1
|
作者
Giroux, Shallen [1 ]
Wachowiak-Smolikova, Renata [1 ]
Wachowiak, Mark P. [1 ]
机构
[1] Nipissing Univ, Dept Math & Comp Sci, N Bay, ON, Canada
关键词
KEYSTROKE DYNAMICS;
D O I
10.1109/NDT.2009.5272133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many different types of keystroke dynamics approaches have been explored to protect personal data in networked systems. Keystroke patterns are behavioral biometrics, and are considered to be as unique to an individual as a signature. This paper presents a new approach to keystroke analysis that uses key press interval ratios to authenticate users. Participants in this study registered their passwords into a specially-designed analysis program. Keypress ratios were calculated, and neural network techniques were employed to obtain a mapping between patterns and the correct user. Results indicate that authentication through keypress ratios achieves high true acceptance rates, while also maintaining low false acceptance rates, which are particularly important in high-security applications. The approach presented here is suitable for incorporation into agent-based networked security systems.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 50 条
  • [1] Behavioral Biometrics for Continuous Authentication
    Handa, Jigyasa
    Singh, Arjeeta
    Goyal, Aditya
    Aggarwal, Parth
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 284 - 289
  • [2] Mobile behavioral biometrics for passive authentication
    Stragapede, Giuseppe
    Vera-Rodriguez, Ruben
    Tolosana, Ruben
    Morales, Aythami
    Acien, Alejandro
    Le Lan, Gael
    [J]. PATTERN RECOGNITION LETTERS, 2022, 157 : 35 - 41
  • [3] Behavioral Biometrics for Universal Access and Authentication
    Mayron, Liam M.
    [J]. UNIVERSAL ACCESS IN HUMAN-COMPUTER INTERACTION: ACCESS TO TODAY'S TECHNOLOGIES, PT I, 2015, 9175 : 330 - 339
  • [4] Continuous Authentication Using Behavioral Biometrics
    Deutschmann, Ingo
    Nordstrom, Peder
    Nilsson, Linus
    [J]. IT PROFESSIONAL, 2013, 15 (04) : 12 - 15
  • [5] Multimodal Biometrics Security System For Authentication
    Maheshwari, A.
    DoraiRangaswamy, M. A.
    [J]. 2016 SECOND INTERNATIONAL CONFERENCE ON SCIENCE TECHNOLOGY ENGINEERING AND MANAGEMENT (ICONSTEM), 2016, : 146 - 150
  • [6] BehaveSense: Continuous authentication for security-sensitive mobile apps using behavioral biometrics
    Yang, Yafang
    Guo, Bin
    Wang, Zhu
    Li, Mingyang
    Yu, Zhiwen
    Zhou, Xingshe
    [J]. AD HOC NETWORKS, 2019, 84 : 9 - 18
  • [7] Authentication services and biometrics: Network security issues
    Benavente, OS
    Picco-Marchetti, R
    [J]. 39TH ANNUAL 2005 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2005, : 333 - 336
  • [8] Dimensional Reduction in Behavioral Biometrics Authentication System
    Munir, Erna Piantari
    Firman, Fauzi Nur
    [J]. PROCEEDINGS OF ICETIT 2019: EMERGING TRENDS IN INFORMATION TECHNOLOGY, 2020, 605 : 984 - 992
  • [9] Augmented PIN Authentication through Behavioral Biometrics
    Nerini, Matteo
    Favarelli, Elia
    Chiani, Marco
    [J]. SENSORS, 2022, 22 (13)
  • [10] Authentication of Smartphone Users Using Behavioral Biometrics
    Alzubaidi, Abdulaziz
    Kalita, Jugal
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 1998 - 2026