Empirical keystroke analysis in passwords

被引:0
|
作者
Montalvao, Jugurta [1 ]
Freire, Eduardo O. [1 ]
Bezerra, Murilo A., Jr. [1 ]
Garcia, Rodolfo [2 ]
机构
[1] Univ Fed Sergipe, Dept Elect Engn, Ave Marechal Rondon S-N, Sao Cristovao, SE, Brazil
[2] Sistemas com Inteligencia Artificial, Aracaju, Brazil
关键词
Biometrics; keystroke; password; AUTHENTICATION;
D O I
暂无
中图分类号
Q [生物科学];
学科分类号
07 ; 0710 ; 09 ;
摘要
Rhythmic patterns in passwords are addressed as a kind of biometrics. Experimental results are obtained through two publicly available databases. A preprocessing step (time interval equalization) is applied to both down-down keystroke latency and key hold-down time. Improvements from this preprocessing step are shown through experiments intentionally adapted from papers by the owners of both databases. Afterwards our main experiments are guided by questions Q1: How long does it take for a typist to develop a proper timing signature associated to a new meaningless password? And Q2: How does the number of symbols affect biometric performance? Measurements show that for the password .tie5Roanl typists need many dozens of repetitions to stabilize their typing rhythm. As for question Q2, experimental results show better performance for the shorter password try4-mbs, and that even for longest one studied, .tie5Roanl, there is room for performance improvement.
引用
收藏
页码:167 / 172
页数:6
相关论文
共 50 条
  • [31] PASSWORDS
    Frank, Gordon
    COMPUTER, 2009, 42 (06) : 6 - 6
  • [32] Keystroke Rhythm Analysis Based on Dynamics of Fingertips
    Suraj
    Sarma, Parthana
    Yadav, Amit Kumar
    Barma, Shovan
    MACHINE INTELLIGENCE AND SIGNAL ANALYSIS, 2019, 748 : 555 - 567
  • [33] Computer User Profiling Based on Keystroke Analysis
    Wesolowski, Tomasz Emanuel
    Porwik, Piotr
    ADVANCED COMPUTING AND SYSTEMS FOR SECURITY, VOL 1, 2016, 395 : 3 - 13
  • [34] Keystroke analysis of different languages: A case study
    Gunetti, D
    Picardi, C
    Ruffo, G
    ADVANCES IN INTELLIGENT DATA ANALYSIS VI, PROCEEDINGS, 2005, 3646 : 133 - 144
  • [35] Dynamic keystroke analysis using AR model
    Eltahir, WE
    Salami, MJE
    Ismail, AF
    Lai, WK
    2004 IEEE International Conference on Industrial Technology (ICIT), Vols. 1- 3, 2004, : 1555 - 1560
  • [36] Acoustical Keystroke Analysis for User Identification and Authentication
    Pleva, Matus
    Kiktova, Eva
    Viszlay, Peter
    Bours, Patrick
    PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE RADIOELEKTRONIKA (RADIOELEKTRONIKA 2016), 2016, : 386 - 389
  • [37] Analysis of Authentication System Based on Keystroke Dynamics
    Daribay, Amanzhol
    Obaidat, Mohammad S.
    Krishna, P. Venkata
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 226 - 231
  • [38] Analysis of Keystroke Dynamics For the Generation of Synthetic Datasets
    Migdal, Denis
    Rosenberger, Christophe
    2018 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW), 2018, : 339 - 344
  • [39] User practice in password security: An empirical study of real-life passwords in the wild
    Shen, Chao
    Yu, Tianwen
    Xu, Haodi
    Yang, Gengshan
    Guan, Xiaohong
    COMPUTERS & SECURITY, 2016, 61 : 130 - 141
  • [40] Passwords, what passion (An analysis of the concept of the password in computers)
    Sciacchitano, A
    AUT AUT, 1999, (289-90): : 133 - 150