Abstract
There has been significant interest in the area of keystroke analysis to support the authentication of users, and previous research has identified three discrete methods of application; static, periodic dynamic and continuous dynamic analysis. This paper summarises the approaches and metrics arising from previous work, and then proceeds to introduce a new variation, based upon application-specific keystroke analysis. The discussion also considers the use of keystroke analysis as a progressive, escalating response measure in the context of a comprehensive user authentication and supervision system, presenting an example of how this could be realised in practice.
Key words
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35586-3_46
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Morrissey J. P.; Sanders P. W. & Stockel C. T. 1996. “Increased domain security through application of local security and monitoring”; Expert Systems; Vol. 13; no. 4; pp295–305.
Lunt T.F. 1990. “IDES: an intelligent system for detecting intruders”;Proceedings of the Symposium on Computer Security: Threat and Counter Measures”; Rome.
Mulcherjee B. & Heberlein L.T. 1994. “Network intrusion detection”; IEEE Networks; vol. 8 no. 3; pp26–45.
Jobusch D.L. & Oldehoeft A.E. 1989. “A survey of password mechanisms: Weaknesses and potential improvements. Part 1”; Computers & Security; vol. 8; no. 7; pp587–603.
Brown M. & Rogers S.J. 1993. “User identification via keystroke characteristics of typed names using neural networks”; International Journal of Man-Machine Studies; vol. 39; pp999–1014.
Joyce R. & Gupta G. 1990. “Identity authentication based on keystroke latencies”; Communications of the ACM; vol. 33; no. 2; pp168–176.
Legett J.; Williams G.; Usnick M. & Longnecker M. 1991. “Dynamic identity verification via keystroke characteristics”; International Journal of Man-machine Studies; vol. 35; pp859–870.
Mahar D.; Napier R.; Wagner M.; Laverty W.; Henderson R.D. & Hiron M. 1995. “Optimizing digraphlatency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions”; International Journal of Human-Computer Studies; vol. 43; pp579–592.
Card S.K.; Moran T.P. & Newell A. 1980. “Computer textediting: An information-processing analysis of a routine cognitive skill”; Cognitive Psychology; vol. 12; pp32–74.
Umphress D. & Williams G. 1985. “Identity verification through keyboard characteristics”; International Journal of Man-Machine Studies; vol. 23; pp263–273.
Legett J. & Williams G. 1988. “Verifying user identity via keystroke characteristics”; International Journal of Man-Machine Studies; vol. 28; pp67–76.
Bleha S.; Slivinsky C. & Hussein B. 1990. “Computer-access security systems using keystroke dynamics”; Actions on pattern analysis and machine intelligence; vol. 12; no. 12; pp1217–1222.
Napier R.; Laverty W.; Mahar D.; Henderson R.; Hiron M. & Wagner M. 1995. “Keyboard user verification: towards an accurate, efficient, and ecologically valid algorithm”; International Journal of Human-Computer Studies; vol. 43; pp213–222.
Furnell S.M.; Morrissey J.P.; Sanders P.W. & Stockel C.T. 1996. “Applications of keystroke analysis for improved login security and continous user authentication”; Proceedings of the 12th International Conference on Information Security (IFIP SEC ’96), Island of Samos, Greece; 22–24 May, pp283–294.
Ord T. & Furnell S.M. 2000. “User authentication for keypad-based devices using keystroke analysis”; Proceedings of the Second International Network Conference (INC 2000), Plymouth, UK, 3–6 July; pp263–272.
Dowland P.S.; Singh H. & Furnell S.M. 2001. “A preliminary investigation of user authentication using continuous keystroke analysis”; Proceedings of the IFIP 8th Annual Working Conference on Information Security Management & Small Systems Security, Las Vegas; 27–28 September.
Furnell S.M. & Dowland P.S. 2000. “A conceptual architecture for real-time intrusion monitoring”; Information Management & Computer Security; vol. 8; no. 2; pp65–74.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Dowland, P.S., Furnell, S.M., Papadaki, M. (2002). Keystroke Analysis as a Method of Advanced User Authentication and Response. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds) Security in the Information Society. IFIP Advances in Information and Communication Technology, vol 86. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35586-3_17
Download citation
DOI: https://doi.org/10.1007/978-0-387-35586-3_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1026-7
Online ISBN: 978-0-387-35586-3
eBook Packages: Springer Book Archive