Advertisement

Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics

  • Adrianna Kozierkiewicz-HetmanskaEmail author
  • Aleksander Marciniak
  • Marcin Pietranik
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9875)

Abstract

Due to the rapid development of Internet and web-based application the number of system which an ordinary user needs to interact grows almost proportionally. People are expected to make bank transfers, send emails using multiple mailboxes, send tax declarations, send birthday wishes solely online. What is more, sometimes only this way being available. The sensitivity of information created using online tools is unquestionable and the highest possible level of data security is therefore expected not only on a corporate level, but also it should be guaranteed to ordinary users. That is the reason why a convenient solution, that do not require any additional expensive equipment (e.g. RFID cards, fingerprint readers, retinal scanners), can assure such security is highly wanted. Therefore, a number of publications have been devoted to methods of user authentication based on their biometrical characteristics (that are obviously individual and can be easily used to encrypt users’ credentials) and one potentially most accessible group of methods is build on top of analysis of users’ personal typing styles. This paper is a presentation of a data evolution method used in our novel biometrical authentication procedure and contains a statistical analysis of the conducted experimental verification.

Keywords

Authentication Scheme Equal Error Rate False Acceptance Rate False Rejection Rate Authentication Method 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Azevedo, G.L., Cavalcanti, G.D., Filho, E.C.B.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, IJCNN 2007, pp. 1947–1952. IEEE (2007)Google Scholar
  2. 2.
    Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)CrossRefGoogle Scholar
  3. 3.
    Carpenter, G.A., Grossberg, S.: Adaptive Resonance Theory. Springer, Heidelberg (2011)Google Scholar
  4. 4.
    Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report (1980)Google Scholar
  5. 5.
    Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)CrossRefzbMATHGoogle Scholar
  6. 6.
    Guven, A., Sogukpinar, I.: Understanding users’ keystroke patterns for computer access security. Comput. Secur. 22(8), 695–706 (2003)CrossRefGoogle Scholar
  7. 7.
    Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)CrossRefGoogle Scholar
  8. 8.
    Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)CrossRefGoogle Scholar
  9. 9.
    Kozierkiewicz-Hetmańska A., Marciniak A., Pietranik M.: User authentication method based on keystroke dynamics, Paper submitted on ICCCI 2016 conference (2016)Google Scholar
  10. 10.
    De Magalhães, S.T., Revett, K., Santos, H.: Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices, NWeSP 2005. IEEE (2005)Google Scholar
  11. 11.
    Marciniak A.: Uwierzytelnianie użytkowników oparte o analizę dynamiki pisania na klawiaturze. Master thesis (2016, in Polish)Google Scholar
  12. 12.
    Monrose F., Rubin A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)Google Scholar
  13. 13.
    Montalvao, J., Almeida, C.A.S., Freire, E.O.: Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, pp. 560–565. IEEE (2006)Google Scholar
  14. 14.
    Revett, K.: A bioinformatics based approach to behavioural biometrics. In: Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007, pp. 665–670. IEEE (2007)Google Scholar
  15. 15.
    Robinson, J.A., Liang, V.M., Chambers, J., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 28(2), 236–241 (1998)CrossRefGoogle Scholar
  16. 16.
    Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier (2009)Google Scholar
  17. 17.
    Yong, S., Lai, W.-K., Goghill, G.: Weightless neural networks for typing biometrics authentication. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS(LNAI), vol. 3214, pp. 284–293. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  18. 18.
    Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Comput. Secur. 23(5), 428–440 (2004)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Adrianna Kozierkiewicz-Hetmanska
    • 1
    Email author
  • Aleksander Marciniak
    • 1
  • Marcin Pietranik
    • 1
  1. 1.Department of Information SystemsWroclaw University of Science and TechnologyWrocławPoland

Personalised recommendations