A Keystroke Dynamics Based System for User Identification

On-the-fly keyboard user authorization is certainly an interesting option for standard security procedures for high-security computer systems. Unauthorized access to logged-in workstation could threaten the security of data and systems. Conventional authorization methods (passwords, fingerprint scans) verify user identity only during logging process, leaving system vulnerable to user replacement afterwards. Procedures overcoming this peril are often invasive (constant visual monitoring) or uncomfortable (frequent identity verification with user cooperation). A possible solution for constant authorization without these drawbacks is to identify the keyboard user while typing. The approach we propose is based on two extracted keystrokes features: 'flight' and 'dwell'. We have tested the suggested solutions on individual group resembling a medium-sized company. The obtained results are promising.

[1]  Anil K. Jain Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..

[2]  Chee Peng Lim,et al.  Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[3]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[4]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[5]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[6]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[7]  Matt Bishop,et al.  What Is Computer Security? , 2003, IEEE Secur. Priv..

[8]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[9]  Yang Wang,et al.  A Model for User Authentication Based on Manner of Keystroke and Principal Component Analysis , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[10]  S. Hyakin,et al.  Neural Networks: A Comprehensive Foundation , 1994 .

[11]  Stephen M. Stigler,et al.  Thomas Bayes's Bayesian Inference , 1982 .