Skip to main content

The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results

  • Conference paper
  • First Online:
Software Engineering Perspectives and Application in Intelligent Systems ( ICTIS 2017, CSOC 2016)

Abstract

In this paper we study keystroke dynamics as an authentication mechanism for touchscreen based devices. A data collection application was designed and implemented for Android devices in order to collect several types of password. Besides easy and strong passwords we propose a new type of password—logical strong—which is a strong password, but easy to remember due to the logic behind the password’s characters. Three main types of feature were used in the evaluation: time-based, touch-based and accelerometer-based. We propose a novel feature set—secondorder—which is independent of the length of the password. The preliminary results show that the lowest equal error rate (EER) is achieved by the logical strong password, followed by the strong password. The worst performance was achieved by the easy password; suggesting that the strong password is the best choice even in the case of keystroke dynamics based authentication systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Ahmad, N., Szymkowiak, A., Campbell, P.A.: Keystroke dynamics in the pre-touchscreen era. Front. Human Neurosci. 7 (2013)

    Google Scholar 

  2. Antal, M., Szabó, L.: An evaluation of one-class and two-class classification algorithms for keystroke dynamics authentication on mobile devices. In: 2015 20th International Conference on Control Systems and Computer Science (CSCS), pp. 343–350 (2015)

    Google Scholar 

  3. Antal, M., Szabó, L., Laszló, I.: Keystroke dynamics on android platform. Procedia Technol. 19, 820–826 (2015). In: 8th International Conference Interdisciplinarity in Engineering, INTER-ENG 2014, 9–10 Oct 2014, Tirgu Mures, Romania

    Google Scholar 

  4. Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7(1), 116–139 (2012)

    Google Scholar 

  5. Bartlow, N., Cukic, B.: Evaluating the reliability of credential hardening through keystroke dynamics. In: 17th International Symposium on Software Reliability Engineering, 2006. ISSRE’06, pp. 117–126 (2006)

    Google Scholar 

  6. Buschek, D., De Luca, A., Alt, F.: Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. CHI’15, pp. 1393–1402. ACM (2015)

    Google Scholar 

  7. Draffin, B., Zhu, J., Zhang, J.: Keysens: Passive user authentication through micro-behavior modeling of soft keyboard interaction. In: Mobile Computing, Applications, and Services, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 130, pp. 184–201. Springer (2014)

    Google Scholar 

  8. Eltahir, W., Salami, M.J.E., Ismail, A., Lai, W.: Design and evaluation of a pressure-based typing biometric authentication system. EURASIP J. Inf. Secur. 2008(1) (2008)

    Google Scholar 

  9. Giot, R., El-Abed, M., Rosenberger, C., et al.: Keystroke dynamics authentication. Biometrics (2011)

    Google Scholar 

  10. Kambourakis, G., Damopoulos, D., Papamartzivanos, D., Pavlidakis, E.: Introducing touchstroke: keystroke-based authentication system for smartphones. Secur. Commun. Netw. (2014)

    Google Scholar 

  11. Killourhy, K., Maxion, R.: Comparing anomaly-detection algorithms for keystroke dynamics. In: IEEE/IFIP International Conference on Dependable Systems Networks, 2009. DSN’09, pp. 125–134 (2009)

    Google Scholar 

  12. Loy, C., Lai, W.K., Lim, C.: Keystroke patterns classification using the ARTMAP-FD neural network. In: Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2007. IIHMSP 2007, vol. 1, pp. 61–64 (2007)

    Google Scholar 

  13. Martin, A., Doddington, G., Kamm, T., Ordowski, M., Przybocki, M.: The DET curve in assessment of detection task performance. Technical report, DTIC Document (1997)

    Google Scholar 

  14. Martono, W., Ali, H., Salami, M.: Keystroke pressure-based typing biometrics authentication system using support vector machines. In: Computational Science and Its Applications ICCSA 2007, vol. 4706, pp. 85–93 (2007)

    Google Scholar 

  15. Mondal, S., Bours, P., Idrus, S.Z.S.: Complexity measurement of a password for keystroke dynamics: preliminary study. In: Proceedings of the 6th International Conference on Security of Information and Networks, pp. 301–305 (2013)

    Google Scholar 

  16. Nonaka, H., Kurihara, M.: Sensing pressure for authentication system using keystroke dynamics. In: International Computational Intelligence Society International Conference on Computational Intelligence. pp. 19–22 (2004)

    Google Scholar 

  17. Teh, P.S., Teoh, A.B.J., Yue, S.: A survey of keystroke dynamics biometrics. Sci. World J. 2013 (2013)

    Google Scholar 

  18. Tey, C.M., Gupta, P., Gao, D.: I can be you: Questioning the use of keystroke dynamics as biometrics. In: NDSS. The Internet Society (2013)

    Google Scholar 

  19. Trojahn, M., Arndt, F., Ortmeier, F.: Authentication with keystroke dynamics on touchscreen keypads-effect of different n-graph combinations. In: MOBILITY 2013, The Third International Conference on Mobile Services, Resources, and Users, pp. 114–119 (2013)

    Google Scholar 

  20. Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann, San Francisco (2011)

    Google Scholar 

  21. Zheng, N., Bai, K., Huang, H., Wang, H.: You are how you touch: user verification on smartphones via tapping behaviors. In: 2014 IEEE 22nd International Conference on Network Protocols (ICNP), pp. 221–232 (2014)

    Google Scholar 

Download references

Acknowledgments

The research has been supported by the European Union and Hungary and co-financed by the European Social Fund through the project TAMOP–4.2.2.C–11/1/KONV–2012–0004–National Research Center for Development and Market Introduction of Advanced Information and Communication Technologies. The authors would like to thank all volunteers who participated in the data collection experiment.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Margit Antal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Antal, M., Nemes, L. (2016). The MOBIKEY Keystroke Dynamics Password Database: Benchmark Results. In: Silhavy, R., Senkerik, R., Oplatkova, Z.K., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. ICTIS CSOC 2017 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33622-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33620-6

  • Online ISBN: 978-3-319-33622-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics