Skip to main content

A Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1059))

Abstract

Keystroke dynamics, also called keystroke biometrics or typing dynamics, is a biometric-based on typing style. Typists have unique typing patterns that can be analyzed to confirm the authenticity of the user. Keystroke dynamics is most often applied in situations where the authenticity of a user must be ascertained with extreme confidence. It could be used as an additional degree of security for password-protected applications. If user’s password is compromised, and the keystroke dynamics of the real user is known, the application may be able to reject the impostor despite having received valid credentials. Different types of keyboards and remote access are major problems of keystroke dynamics authentication technique. In this paper, a comprehensive analysis of contemporary work on keystroke dynamic authentication mechanisms is summarized to analyze the effectiveness of various methodologies in present. Also, various statistical-based and machine learning-based algorithms are analyzed with their strengths and weaknesses. From this survey, it was observed that there is a need to strengthen the keystroke dynamics dataset which has all essential features. Also an efficient algorithm is required to obtain high accuracy to make authentication effective, as the performance of biometric keystroke authentication is still an open research.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Uludag U et al (2004) Biometric cryptosystems: issues and challenges. Proc IEEE 92:948–960

    Article  Google Scholar 

  2. Uludag U, Jain AK (2004) Attacks on biometric systems: a case study in fingerprints. Proc IEEE 92:948–960

    Article  Google Scholar 

  3. Uludag U et al (2004) Biometric template selection and update: a case study in fingerprints. Pattern Recognit 37:1533–1542

    Article  Google Scholar 

  4. Jain AK et al (2005) Biometric template security: challenges and solutions. In: Signal processing conference, pp 1–4

    Google Scholar 

  5. Moody J (2004) Public perceptions of biometric devices: the effect of misinformation on acceptance and use. In: Issues in informing science & information technology

    Google Scholar 

  6. Umphress D, Williams G (1985) Identity verification through keyboard characteristics. Int J Man-Mach Stud 23:263–273

    Article  Google Scholar 

  7. Dowland PS et al (2004) A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Security and protection in information processing systems. Springer, Berlin, pp 275–289

    Google Scholar 

  8. Mondal S et al (2016) Combining keystroke and mouse dynamics for continuous user authentication and identification. In: IEEE international conference on identity, security and behavior analysis (ISBA), pp 1–8

    Google Scholar 

  9. Obaidat MS et al (1999) Estimation of pitch period of speech signal using a new dyadic wavelet algorithm. Inf Sci 119:21–39

    Article  Google Scholar 

  10. Gunetti D et al (2005) Keystroke analysis of free text. ACM Trans Inf Syst Secur (TISSEC) 8:312–347

    Article  Google Scholar 

  11. Mondal S, Bours P (2015) A computational approach to the continuous authentication biometric system. Inf Sci 304:28–53

    Article  Google Scholar 

  12. Mondal S et al (2015) Continuous authentication in a real world settings. In: Eighth international conference on advances in pattern recognition, pp 1–6

    Google Scholar 

  13. Ali ML et al (2015) Authentication and identification methods used in keystroke biometric systems. In: High performance computing and communications (HPCC), pp 1424–1429

    Google Scholar 

  14. Mhenni A et al (2016) Keystroke template update with adapted thresholds. In: 2nd international conference on advanced technologies for signal and image processing (ATSIP), pp 483–488

    Google Scholar 

  15. Pisani PH et al (2016) Enhanced template update: application to keystroke dynamics. Comput Secur 60:134–153

    Article  Google Scholar 

  16. Çeker H et al (2016) Adaptive techniques for intra-user variability in keystroke dynamics. In: Biometrics theory, applications and systems (BTAS). IEEE, New York, pp 1–6

    Google Scholar 

  17. Rahman KA et al (2013) Snoop-forge-replay attacks on continuous verification with keystrokes. IEEE Trans Inf Forensics Secur 8:528–541

    Article  Google Scholar 

  18. Koakowska A et al (2018) Usefulness of keystroke dynamics features in user authentication and emotion recognition. In: Human-computer systems interaction. Springer, Berlin, pp 42–52

    Google Scholar 

  19. Kim S et al (2014) A correlation method for handling infrequent data in keystroke biometric systems. In: International workshop on biometrics and forensics (IWBF), pp 1–6

    Google Scholar 

  20. Gentner DR et al (1983) A glossary of terms including a classification of typing errors. In: Cognitive aspects of skilled typewriting. Springer, Berlin, pp 39–43

    Chapter  Google Scholar 

  21. Roth J et al (2015) Investigating the discriminative power of keystroke sound. IEEE Trans Inf Forensics Secur 10:333–345

    Article  Google Scholar 

  22. Zhong Y, Deng Y (2015) A survey on keystroke dynamics biometrics: approaches, advances, and evaluations. In: Recent advances in user authentication using keystroke dynamics biometrics. Science Gate Publishing, pp 1–22

    Google Scholar 

  23. Akila M et al (2012) A novel feature subset selection algorithm using artificial bee colony in keystroke dynamics. In: Proceedings of the international conference on soft computing for problem solving (SocProS), pp 813–820

    Google Scholar 

  24. Monaco JV, Tappert CC (2018) The partially observable hidden markov model and its application to keystroke dynamics. Pattern Recognit 76:449–462

    Article  Google Scholar 

  25. Ceker H, Upadhyaya S (2015) Enhanced recognition of keystroke dynamics using Gaussian mixture models. In: Military communications conference, MILCOM IEEE, pp 1305–1310

    Google Scholar 

  26. Alsultan A et al (2017) Improving the performance of free-text keystroke dynamics authentication by fusion. Appl Soft Comput

    Google Scholar 

  27. Ho J, Kang D-K (2018) One-class nave bayes with duration feature ranking for accurate user authentication using keystroke dynamics. Appl Intell 48:1547–1564

    Article  Google Scholar 

  28. Balagani et al (2011) On the discriminability of keystroke feature vectors used in fixed text keystroke authentication. Pattern Recognit Lett 32(7):1070–1080

    Article  Google Scholar 

  29. Loy CC et al (2005) Pressure-based typing biometrics user authentication using the fuzzy artmap neural network. In: Proceedings of the twelfth international conference on neural information processing (ICONIP), pp 647–652

    Google Scholar 

  30. Li Y et al (2011) Study on the Beihang keystroke dynamics database. In: International joint conference biometricson, pp 1–5

    Google Scholar 

  31. Sridhar M et al (2013) Intrusion detection using keystroke dynamics. In: Proceedings of the third international conference on trends in information, telecommunication and computing. Springer, Berlin. https://doi.org/10.1007/978-1-4614-3363-7_16

    Google Scholar 

  32. Deng Y, Zhong Y (2013) eystroke dynamics user authentication based on Gaussian mixture model and deep belief nets. In: ISRN signal processing. ArticleID 565183. https://doi.org/10.1155/2013/565183

    Article  Google Scholar 

  33. Killourhy KS, Maxion RA (2009) Comparing anomaly-detection algorithms for keystroke dynamics. In: Proceedings of IEEE/IFIP international conference on dependable systems & networks (DSN), pp 125–134

    Google Scholar 

  34. Kim J et al (2018) Keystroke dynamics-based user authentication using freely typed text based on user-adaptive feature extraction and novelty detection. Appl Soft Comput 62:1077–1087

    Article  Google Scholar 

  35. Lau S, Maxion R (2014) Clusters and markers for keystroke typing rhythms. In: The LASER workshop: learning from authoritative security experiment results

    Google Scholar 

  36. Alsultan A et al (2017) Non-conventional keystroke dynamics for user authentication. Pattern Recognit Lett 89:53–59

    Article  Google Scholar 

  37. Ho G et al (2014) Tapdynamics: strengthening user authentication on mobile phones with keystroke dynamics. Technical report, Stanford University

    Google Scholar 

  38. Li BZY et al (2011) Study on the Beihang keystroke dynamics database. In: Proceedings of the international joint conference on biometrics (IJCB), pp 1–5

    Google Scholar 

  39. Giot R et al (2011) Unconstrained keystroke dynamics authentication with shared secret. Comput Secur 30(6–7):427–445

    Article  Google Scholar 

  40. Martono W et al (2007) Keystroke pressure-based typing biometrics authentication system using support vector machines. In: Proceedings of computational science and its applications ICCSA 2007: international conference, Part II, pp 85–93

    Google Scholar 

  41. Jiang SSC, Liu J (2007) Keystroke statistical learning model for web authentication. In: 2nd ACM symposium on information, computer and communications security (ASIACCS), pp 359–361

    Google Scholar 

  42. Wesoowski TE et al (2015) User verification based on the analysis of keystrokes while using various software. J Med Inf Technol 24:13–22

    Google Scholar 

  43. Longi K et al (2015) Identification of programmers from typing patterns. In: Proceedings of the 15th Koli Calling conference on computing education research, pp 60–67

    Google Scholar 

  44. Mhenni A et al (2018) Towards a secured authentication based on an online double serial adaptive mechanism of users’ keystroke dynamics. In: International conference on digital society and eGovernments

    Google Scholar 

  45. Kambourakis G et al (2016) Introducing touchstroke: keystroke based authentication system for smartphones. Secur Commun Netw 9:542–554

    Article  Google Scholar 

  46. Zhong Y et al (2012) Keystroke dynamics for user authentication. In: IEEE computer society conference on computer vision and pattern recognition workshops (CVPRW), pp 117–123

    Google Scholar 

  47. Ivannikova E et al (2017) Anomaly detection approach to keystroke dynamics based user authentication. In: IEEE symposium on computers and communications (ISCC), pp 885–889

    Google Scholar 

  48. Dholi PR, Chaudhari K (2013) Typing pattern recognition using keystroke dynamics. In: Mobile communication and power engineering. Springer, Berlin, pp 275–280

    Chapter  Google Scholar 

  49. Ahmed AA, Traore I (2014) Biometric recognition based on free-text keystroke dynamics. IEEE Trans Cybern 44:458–472

    Article  Google Scholar 

  50. Alghamdi SJ et al (2015) Dynamic user verification using touch keystroke based on medians vector proximity. In: 7th international conference on computational intelligence, communication systems and networks, pp 121–126

    Google Scholar 

  51. Giot R et al (2009) Greyc keystroke: a benchmark for keystroke dynamics biometric systems. In: IEEE 3rd international conference biometrics: theory, applications, and systems, pp 1–69

    Google Scholar 

  52. Giot R, El-Abed M, Rosenberger C (2012) Web-based benchmark for keystroke dynamics biometric systems: a statistical analysis. In: Eighth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP), pp 11–15

    Google Scholar 

  53. Bello L et al (2010) Collection and publication of a fixed text keystroke dynamics dataset. In: XVI Congreso Argentino de Ciencias de la Computacin

    Google Scholar 

  54. Idrus SZS et al (2013) Soft biometrics database: a benchmark for keystroke dynamics biometric systems. In: IEEE conference on biometrics special interest group (BIOSIG), pp 1–8

    Google Scholar 

  55. Antal M et al (2015) Keystroke dynamics on android platform. Proc Technol 19:820–826

    Article  Google Scholar 

  56. Vural E et al (2014) Shared research dataset to support development of keystroke authentication. In: IEEE International joint conference on biometrics, pp 1–8

    Google Scholar 

  57. El-Abed M et al (2014) Rhu keystroke: a mobile-based benchmark for keystroke dynamics systems. In: International Carnahan conference security technology (ICCST), pp 1–4

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nataasha Raul .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Raul, N., Shankarmani, R., Joshi, P. (2020). A Comprehensive Review of Keystroke Dynamics-Based Authentication Mechanism. In: Khanna, A., Gupta, D., Bhattacharyya, S., Snasel, V., Platos, J., Hassanien, A. (eds) International Conference on Innovative Computing and Communications. Advances in Intelligent Systems and Computing, vol 1059. Springer, Singapore. https://doi.org/10.1007/978-981-15-0324-5_13

Download citation

Publish with us

Policies and ethics