Keystroke Dynamics Based User Authentication Using Neural Networks

  • Roman Roštár
  • Jaroslav Olejár
Conference paper


We present a possible use of neural networks in the area of computer security. The back-propagation neural network is used to implement a prototype user authentication procedure using, capable to determine whether the user typing on the keyboard is valid. The obtained results are presented.


Hide Layer False Alarm Rate Intrusion Detection User Authentication Intrusion Detection System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bleha S.A., Obaidat M.S.: An Intelligent Neural System For Identifying Computer Users. C.Dagli et al. (eds.): Intelligent Engineering Systems through Artificial Neural Networks. New York, ASME Press, 953–959 (1991).Google Scholar
  2. 2.
    Brown, M., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. Man-Machine Studies 39, 999–1024 (1993).CrossRefGoogle Scholar
  3. 3.
    Debar H., Becker M., Siboni D.: A Neural Network Component for an Intrusion Detection Systems. Proc. 1992 IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press 240–250 (1992).Google Scholar
  4. 4.
    Fox K.L., Henning R.R., Reed J.H., Simonian R.P.: A Neural Network Approach Towards Intrusion Detection. Proc. 13th National Computer Security Conference, vol. 1, 125–134 (1990).Google Scholar
  5. 5.
    Joyce R., Gupta G.: Identity Authentication Based on Keystroke Latencies. Communications of the ACM 33 No. 2 168–176 (1990)CrossRefGoogle Scholar
  6. 6.
    Legget J., Williams G., Usnick M., Longnecker M.: Dynamic identity verification via keystroke characteristics. Int. J. Man-Machine Studies 35, 859–870 (1991).CrossRefGoogle Scholar
  7. 7.
    Lippmann R.P.: An introduction to computing with neural nets. IEEE ASSP Magazine, 4–22 (1987).Google Scholar
  8. 8.
    RoStdr R., Durkovic M.: Two Methods for Computer Users Identification. Proc. 12th Int. Conference Applied Informatics, IASTED 180–183 (1994).Google Scholar
  9. 9.
    Roštár R., Olejar J., Safarik J.: Structured Approach to User Identification. Submitted to 10th IEEE Conf. on Computer Assurance COMPASS 1995.Google Scholar

Copyright information

© Springer-Verlag/Wien 1995

Authors and Affiliations

  • Roman Roštár
    • 1
  • Jaroslav Olejár
    • 1
  1. 1.Deptartment of Computer ScienceSlovak Technical UniversityBratislavaSlovakia

Personalised recommendations