Keystroke-Based Authentication by Key Press Intervals as a Complementary Behavioral Biometric

被引:9
|
作者
Giroux, Shallen [1 ]
Wachowiak-Smolikova, Renata [1 ]
Wachowiak, Mark P. [1 ]
机构
[1] Nipissing Univ, Dept Math & Comp Sci, N Bay, ON, Canada
关键词
biometrics; keystroke dynamics; authentication; DYNAMICS;
D O I
10.1109/ICSMC.2009.5346319
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Analysis of keystroke dynamics can be useful in protecting personal data because an individual is authenticated not only by password, but also by that individual's keystroke patterns. In this way, intrusion becomes more difficult because the username/password pair, as well as the typing speed and correct keystroke pattern must both be duplicated. The purpose of this paper is to present a keystroke analysis tool that can be incorporated into distributed systems and web-based services. This study also assesses the potential of keystroke analysis as a complementary authentication mechanism. Eleven individuals entered a password into specially developed keystroke analysis software twenty times over a course of four sessions. The data were statistically analyzed to determine keystroke patterns. Tests were performed to verify whether the users could be properly authenticated. Results show that authentication with mean key press timings resulted in very good false acceptance rates, while allowing access to appropriate users.
引用
收藏
页码:80 / 85
页数:6
相关论文
共 50 条
  • [1] Keystroke-Based Biometric Authentication in Mobile Devices
    Urtiga, E. V. C.
    Moreno, E. D.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2011, 9 (03) : 383 - 390
  • [2] Biometric verification using keystroke motion and key press timing for ATM user authentication
    Ogihara, Akio
    Matsumura, Hiroyuki
    Shiozaki, Akira
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1 AND 2, 2006, : 199 - 202
  • [3] Introducing touchstroke: keystroke-based authentication system for smartphones
    Kambourakis, Georgios
    Damopoulos, Dimitrios
    Papamartzivanos, Dimitrios
    Pavlidakis, Emmanouil
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (06) : 542 - 554
  • [4] Improvements to Keystroke-Based Authentication By Adding Linguistic Context
    Goodkind, Adam
    Brizan, David Guy
    Rosenberg, Andrew
    [J]. 2015 IEEE 7TH INTERNATIONAL CONFERENCE ON BIOMETRICS THEORY, APPLICATIONS AND SYSTEMS (BTAS 2015), 2015,
  • [5] Behavioral biometric authentication on smartphone using keystroke dynamics
    Vaishnav, Pragya
    Kaushik, Manju
    Raja, Linesh
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (02): : 591 - 600
  • [6] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Nauman, Mohammad
    Ali, Tamleek
    Rauf, Azhar
    [J]. TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2149 - 2161
  • [7] TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
    Nauman, Mohammad
    Ali, Tamleek
    [J]. INFORMATION SECURITY AND ASSURANCE, 2010, 76 : 286 - +
  • [8] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Lulu Yang
    Chen Li
    Ruibang You
    Bibo Tu
    Linghui Li
    [J]. Cybersecurity, 4
  • [9] TKCA: a timely keystroke-based continuous user authentication with short keystroke sequence in uncontrolled settings
    Yang, Lulu
    Li, Chen
    You, Ruibang
    Tu, Bibo
    Li, Linghui
    [J]. CYBERSECURITY, 2021, 4 (01)
  • [10] Using trusted computing for privacy preserving keystroke-based authentication in smartphones
    Mohammad Nauman
    Tamleek Ali
    Azhar Rauf
    [J]. Telecommunication Systems, 2013, 52 : 2149 - 2161