Skip to main content

Towards Keystroke Continuous Authentication Using Time Series Analytics

  • Conference paper
  • First Online:
Research and Development in Intelligent Systems XXXIII (SGAI 2016)

Abstract

An approach to Keystroke Continuous Authentication (KCA) is described founded on a time series analysis based approach that, unlike previous work on KCA (using feature vector representations), takes the sequencing of keystrokes into consideration. The significance of KCA is in the context of online assessments and examinations used in eLearning environments and MOOCs, which are becoming increasingly popular. The process is fully described and analysed, including comparison with established feature vector approaches. Our proposed method outperforms these other approaches to KCA (with a detection accuracy of 94 %, compared to 79.53 %), a clear indicator that the proposed time series analysis based KCA has significant potential.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://www.turnitinuk.com/.

  2. 2.

    The interface can be found at: http://cgi.csc.liv.ac.uk/~hsaalshe/WBKTR3.html.

References

  1. Gaines, R.S., Lisowski, W., Press, S.J., Shapiro, N.: Authentication by keystroke timing: some preliminary results, no. RAND-R-2526-NSF. RAND Corp., Santa Monica, CA (1980)

    Google Scholar 

  2. Bleha, S., Slivinsky, C., Hussien, B.: Computer-access security systems using keystroke dynamics. IEEE Trans. Pattern Anal. Mach. Intell. 12(12), 1217–1222 (1990)

    Article  Google Scholar 

  3. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  4. Ogihara, A., Matsumuar, H., Shiozaki, A.: Biometric verification using keystroke motion and key press timing for atm user authentication. In: Intelligent Signal Processing and Communications, 2006. ISPACS’06, pp. 223–226. IEEE

    Google Scholar 

  5. Syed, Z., Banerjee, S., Cukic, B.: Normalizing variations in feature vector structure in keystroke dynamics authentication systems. Softw. Qual. J. 1–21 (2014)

    Google Scholar 

  6. Ahmed, A.A., Traore, I.: Biometric recognition based on free-text keystroke dynamics. IEEE Trans. Cybern. 44(4), 458–472 (2014)

    Article  Google Scholar 

  7. Bours, P.: Continuous keystroke dynamics: a different perspective towards biometric evaluation. Inf. Secur. Tech. Rep. 17(1), 36–43 (2012)

    Article  Google Scholar 

  8. e Silva, S.R.D.L., Roisenberg, M.: Continuous authentication by keystroke dynamics using committee machines. In: Intelligence and Security Informatics, pp. 686–687. Springer, Berlin (2006)

    Google Scholar 

  9. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)

    Article  MATH  Google Scholar 

  10. Messerman, A., Mustafic, T., Camtepe, S.A., Albayrak, S.: Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics. In: 2011 International Joint Conference on Biometrics (IJCB), pp. 1–8. IEEE (2011)

    Google Scholar 

  11. Shepherd, S.J.: Continuous authentication by analysis of keyboard typing characteristics. In: European Convention on Security and Detection, 1995, pp. 111–114. IET (1995)

    Google Scholar 

  12. Richardson, A., Kaminka, G.A., Kraus, S.: REEF: resolving length bias in frequent sequence mining using sampling. Int. J. Adv. Intell. Syst. 7(1), 2 (2014)

    Google Scholar 

  13. Dowland, P.S., Furnell, S.M.: A long-term trial of keystroke profiling using digraph, trigraph and keyword latencies. In: Security and Protection in Information Processing Systems, pp. 275–289. Springer, US (2004)

    Google Scholar 

  14. Rabiner, L., Juang, B.H.: Fundamentals of speech recognition. Prentice Hall (1993)

    Google Scholar 

  15. Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. In: KDD Workshop, vol. 10, no. 16, pp. 359–370

    Google Scholar 

  16. Polemi, D.: Biometric techniques: review and evaluation of biometric techniques for identification and authentication, including an appraisal of the areas where they are most applicable. Reported prepared for the European Commision DG XIIIC, 4 (1997)

    Google Scholar 

  17. Craswell, N.: Mean reciprocal rank. In: Encyclopedia of Database Systems, pp. 1703–1703. Springer, US (2009)

    Google Scholar 

Download references

Acknowledgments

We would like to express our thanks to those who participated in collecting the data and to Laureate Online Education b.v. for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdullah Alshehri .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Alshehri, A., Coenen, F., Bollegala, D. (2016). Towards Keystroke Continuous Authentication Using Time Series Analytics. In: Bramer, M., Petridis, M. (eds) Research and Development in Intelligent Systems XXXIII. SGAI 2016. Springer, Cham. https://doi.org/10.1007/978-3-319-47175-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47175-4_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47174-7

  • Online ISBN: 978-3-319-47175-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics