User authentication through keystroke dynamics

@article{Bergadano2002UserAT,
  title={User authentication through keystroke dynamics},
  author={Francesco Bergadano and Daniele Gunetti and Claudia Picardi},
  journal={ACM Trans. Inf. Syst. Secur.},
  year={2002},
  volume={5},
  pages={367-397}
}
Unlike other access control systems based on biometric features, keystroke analysis has not led to techniques providing an acceptable level of accuracy. The reason is probably the intrinsic variability of typing dynamics, versus other---very stable---biometric characteristics, such as face or fingerprint patterns. In this paper we present an original measure for keystroke dynamics that limits the instability of this biometric feature. We have tested our approach on 154 individuals, achieving a… 
Biometric Authentication and Identification using Keystroke Dynamics: A Survey
TLDR
The use and acceptance of this biometric could be increased by development of standardized databases, assignment of nomenclature for features, development of common data interchange formats, establishment of protocols for evaluating methods, and resolution of privacy issues.
Keystroke Dynamics Biometrics, A tool for User Authentication–Review
TLDR
A perceptive survey with comparison on keystroke dynamics biometrics study performed till now is the objective of this paper and considers here the best results reported in the Structured Text as well as free text scenario in terms of False Rejection Rate (FRR) &False Acceptance Rate (FAR).
Investigation about Authentication Biometrics using Keystroke Dynamics
—This paper uses a Keystroke Dynamics in biometric authentication. The user is identified for the habitual rhythm to type your complete name in a conventional keyboard. Two features (e.g., durations
Sound and Keystroke Dynamics Analysis for User Authenticity Verification
  • V. Loboda, G. Kolaczek
  • Computer Science
    2019 IEEE 14th International Conference on Intelligent Systems and Knowledge Engineering (ISKE)
  • 2019
TLDR
An approach to solving one of the main security problems of modern information systems, related to unauthorized access to its resources, by combining the frequently used dynamic elements of typing with the sound spectrogram associated with the process of typing.
Soft Biometrics for Keystroke Dynamics
TLDR
A new soft biometric approach for keystroke dynamics that combines the ability to recognise the hand(s) used; the gender; the age category; and the handedness of a user when he/she types a given password or passphrase on a keyboard is presented.
Biometric Authentication and Identification using Keystroke Dynamics with Alert Levels
TLDR
It is concluded that by enabling a biometric keystroke dynamic authentication system, 97.75% of all false login attempts, with stolen but valid credentials, can be prevented, although with a potential downside of increasing the number of falsely rejected logins by 4.17%.
Developing a Keystroke Biometric System for Continual Authentication of Computer Users
TLDR
Using keystroke data from 120 users, system performance was obtained as a function of two independent variables: the user population size and the number of keystrokes per sample and it was found that for each population size, the performance increased roughly logarithmically as the numberof keystroke per sample was increased.
Using the Keystrokes Dynamic for Systems of Personal Security
TLDR
The results show that the use of the Keystroke Dynamics is simple and efficient for personal authentication, getting optimum resulted using 90% of the features with 4.44% FRR and 0% FAR.
Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments
TLDR
A new online risk-based authentication system that provides more robust user identity information by combining mouse dynamics and keystroke dynamics biometrics in a multimodal framework is proposed.
Biometric Authentication Techniques: A Study on Keystroke Dynamics
Biometrics technologies are gaining popularity today since they provide reliable and efficient means of authentication and verification. Our dependency on electronic devices is growing, and so is our
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 37 REFERENCES
Dynamic Identity Verification via Keystroke Characteristics
TLDR
A research study is described which was conducted to determine the possibility of using keystroke characteristics as a means of dynamic identity verification, and results indicate significant promise in the temporal personnel identification problem.
Computer-Access Security Systems Using Keystroke Dynamics
TLDR
By performing real-time measurements of the time durations between the keystrokes when a password is entered and using pattern-recognition algorithms, three online recognition systems were devised and tested.
Applications of keystroke analysis for improved login security and continuous user authentication
TLDR
The discussion identifies that the concept may be implemented in two ways, providing the basis for both an enhanced authentication front-end as well as for continuous, transparent supervision throughout the session.
Identity Verification Through Keyboard Characteristics
TLDR
A reference profile is built to serve as a basis of comparison for future typing samples and has the capability of providing identity surveillance throughout the entire time at the keyboard.
Verification of computer users using keystroke dynamics
This paper presents techniques to verify the identity of computer users using the keystroke dynamics of computer user's login string as characteristic patterns using pattern recognition and neural
Password hardening based on keystroke dynamics
TLDR
This work presents a novel approach to improving the security of passwords that automatically adapts to gradual changes in a user's typing patterns while maintaining the same hardened password across multiple logins, for use in file encryption or other applications requiring a longterm secret key.
Authentication by Keystroke Timing: Some Preliminary Results
TLDR
The authors found that of the large number of digraphs represented in most ordinary paragraphs, there were five which could serve as a basis for distinguishing among the subjects, and that this method of distinguishing subjects might provide the basis for a computer authentication system.
Identity authentication based on keystroke latencies
TLDR
A method of verifying the identity of a user based on a stream of latency periods between keystrokes, and results from trial usage of the system are reported.
Authentication via keystroke dynamics
TLDR
A database of 42 profiles was constructed based on keystroke patterns gathered from various users performing structured and unstructured tasks, and a toolkit for analyzing system performance under varying criteria is presented.
Optimizing digraph-latency based biometric typist verification systems: inter and intra typist differences in digraph latency distributions
TLDR
It was found that typist verification accuracy improved when a digraph-specific index of the distance between test and reference digraph latencies was employed and the utility of nonlinear modelling as a tool to establish optimum verification parameter settings was shown.
...
1
2
3
4
...