Skip to main content

Dealing with Different Languages and Old Profiles in Keystroke Analysis of Free Text

  • Conference paper
AI*IA 2005: Advances in Artificial Intelligence (AI*IA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3673))

Included in the following conference series:

Abstract

In this paper we show experimentally that typing dynamics of free text provide useful information for user identification and authentication even when a long time has passed since typing profiles of users were formed, and even when users are writing in a language different from the one used to form their profiles. Hence, we argue that keystroke analysis can be an effective aid in different areas where ascertaining user identity is important or crucial, including Computer Security and User Modeling.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ashbourn, J.: Biometrics: Advanced Identity Verification. The Complete Guide. Springer, London (2000)

    Google Scholar 

  2. Axelsson, S.: The Base-rate Fallacy and the Difficulty of Intrusion Detection. ACM Transactions on Information and System Security 3(3), 186–205 (2000)

    Article  MathSciNet  Google Scholar 

  3. Bergadano, F., Gunetti, D., Picardi, C.: User authentication through keystroke dynamics. ACM Trans. on Information and System Security 5(4) (2002)

    Google Scholar 

  4. Bergadano, F., Gunetti, D., Picardi, C.: Identity Verification through Dynamic Keystroke Analysis. Journal of Intelligent Data Analysis 7(5) (2003)

    Google Scholar 

  5. Brown, M.E., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. of Man-Machine Studies 39, 999–1014 (1993)

    Article  Google Scholar 

  6. Dowland, P., Furnell, S., Papadaki, M.: Keystroke Analysis as a Method of Advanced User Authentication and Response. In: Proc. of of IFIP/SEC 2002 - 17th Int. Conf. on Information Security, Cairo, Egypt (2002)

    Google Scholar 

  7. Dowland, P., Furnell, S.: A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies. In: Proc. of IFIP/SEC 2004 - 19th Int. Conf. on Information Security, Toulouse, France. Kluwer, Dordrecht (2004)

    Google Scholar 

  8. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification, 2nd edn. John Wiley, Chichester (2000)

    Google Scholar 

  9. Fink, J., Kobsa, A.: A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web. User Modeling and User-Adapted Interaction 10(3-4), 209–249 (2002)

    Google Scholar 

  10. Furnell, S., Morrissey, J., Sanders, P., Stockel, C.: Applications of keystroke analysis for improved login security and continuous user authentication. In: Proc. of the Information and System Security Conf. (1996)

    Google Scholar 

  11. Gunetti, D., Ruffo, G.: Intrusion Detection through Behavioural Data. In: Proc. of the Third Symp. on Intelligent Data Analysis. LNCS. Springer, Heidelberg (1999)

    Google Scholar 

  12. Clarke, N., Furnell, S., Lines, B., Reynolds, P.: Using Keystroke Analysis as a mechanism for Subscriber Authentication on Mobile Handsets. In: Proc. of the 18th IFIP/SEC 2003 Conf., Athens, Greece. Kluwer, Dordrecht (2003)

    Google Scholar 

  13. Joyce, R., Gupta, G.: User authorization based on keystroke latencies. Comm. of the ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  14. Leggett, J., Williams, G.: Verifying identity via keystroke characteristics. Int. J. of Man-Machine Studies 28(1), 67–76 (1988)

    Article  Google Scholar 

  15. Leggett, J., Williams, G.I., Usnick, M.: Dynamic identity verification via keystroke characteristics. Int. J. of Man-Machine Studies 35, 859–870 (1991)

    Article  Google Scholar 

  16. Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: Proc. of the 4th ACM Computer and Communications Security Conf. ACM Press, New York (1997)

    Google Scholar 

  17. Obaidat, M.S., Sadoun, B.: A simulation evaluation study of neural network techniques to computer user identification. Information Sciences 102, 239–258 (1997)

    Article  Google Scholar 

  18. Perkowitz, M., Etzioni, O.: Adaptive Web Sites: Conceptual Framework and Case Study. Artificial Intelligence 118(1,2), 245–275 (2000)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gunetti, D., Picardi, C., Ruffo, G. (2005). Dealing with Different Languages and Old Profiles in Keystroke Analysis of Free Text. In: Bandini, S., Manzoni, S. (eds) AI*IA 2005: Advances in Artificial Intelligence. AI*IA 2005. Lecture Notes in Computer Science(), vol 3673. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11558590_36

Download citation

  • DOI: https://doi.org/10.1007/11558590_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29041-4

  • Online ISBN: 978-3-540-31733-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics