Keypress Interval Timing Ratios as Behavioral Biometrics for Authentication in Computer Security

被引:1
|
作者
Giroux, Shallen [1 ]
Wachowiak-Smolikova, Renata [1 ]
Wachowiak, Mark P. [1 ]
机构
[1] Nipissing Univ, Dept Math & Comp Sci, N Bay, ON, Canada
关键词
KEYSTROKE DYNAMICS;
D O I
10.1109/NDT.2009.5272133
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many different types of keystroke dynamics approaches have been explored to protect personal data in networked systems. Keystroke patterns are behavioral biometrics, and are considered to be as unique to an individual as a signature. This paper presents a new approach to keystroke analysis that uses key press interval ratios to authenticate users. Participants in this study registered their passwords into a specially-designed analysis program. Keypress ratios were calculated, and neural network techniques were employed to obtain a mapping between patterns and the correct user. Results indicate that authentication through keypress ratios achieves high true acceptance rates, while also maintaining low false acceptance rates, which are particularly important in high-security applications. The approach presented here is suitable for incorporation into agent-based networked security systems.
引用
收藏
页码:195 / 200
页数:6
相关论文
共 50 条
  • [31] Online risk-based authentication using behavioral biometrics
    Issa Traore
    Isaac Woungang
    Mohammad S. Obaidat
    Youssef Nakkabi
    Iris Lai
    [J]. Multimedia Tools and Applications, 2014, 71 : 575 - 605
  • [32] Privacy-preserving continuous authentication using behavioral biometrics
    Baig, Ahmed Fraz
    Eskeland, Sigurd
    Yang, Bian
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (06) : 1833 - 1847
  • [33] Continuous user authentication on smartphone via behavioral biometrics: a survey
    Rayani, Praveen Kumar
    Changder, Suvamoy
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (02) : 1633 - 1667
  • [34] BrainRun: A Behavioral Biometrics Dataset towards Continuous Implicit Authentication
    Papamichail, Michail D.
    Chatzidimitriou, Kyriakos C.
    Karanikiotis, Thomas
    Oikonomou, Napoleon-Christos I.
    Symeonidis, Andreas L.
    Saripalle, Sashi K.
    [J]. DATA, 2019, 4 (02)
  • [35] Privacy-preserving continuous authentication using behavioral biometrics
    Ahmed Fraz Baig
    Sigurd Eskeland
    Bian Yang
    [J]. International Journal of Information Security, 2023, 22 : 1833 - 1847
  • [36] Hold & Sign: A Novel Behavioral Biometrics for Smartphone User Authentication
    Buriro, Attaullah
    Crispo, Bruno
    DelFrari, Filippo
    Wrona, Konrad
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 276 - 285
  • [37] Study of Cancelable Biometrics in Security Improvement of Biometric Authentication System
    Shin, Sanggyu
    Seto, Yoichi
    [J]. COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT, 2015, 9339 : 547 - 558
  • [38] Biometrics authentication and reputation based policies in a mas security framework
    Conti, V.
    Milici, G.
    Sorbello, F.
    Vitabile, S.
    Pilato, G.
    [J]. 4TH INTERNATIONAL INDUSTRIAL SIMULATION CONFERENCE 2006, 2006, : 41 - +
  • [39] Behavioral biometrics & continuous user authentication on mobile devices: A survey
    Stylios, Ioannis
    Kokolakis, Spyros
    Thanou, Olga
    Chatzis, Sotirios
    [J]. INFORMATION FUSION, 2021, 66 : 76 - 99
  • [40] Continuous user authentication on smartphone via behavioral biometrics: a survey
    Praveen Kumar Rayani
    Suvamoy Changder
    [J]. Multimedia Tools and Applications, 2023, 82 : 1633 - 1667