Improvement of keystroke data quality through artificial rhythms and cues

Keystroke dynamics based user authentication (KDA) can achieve a relatively high performance if a fairly large number of typing patterns are available. It is almost always the case that KDA is combined with password based authentication. Users are often required to change their passwords. When a user changes one's password, however, only a handful of new patterns become available. In a mobile situation, moreover, very short passwords are used. Under such a circumstance, the quality of data becomes important. Recently, artificial rhythms and cues were proposed to improve the quality of data. In this paper, we verify the effectiveness of artificial rhythms and cues through hypotheses tests using the data from 25 users under various situations. The experimental results show that artificial rhythms increase the uniqueness while cues increase the consistency.

[1]  Sungzoon Cho,et al.  Artificial Rhythms and Cues for Keystroke Dynamics Based Authentication , 2006, ICB.

[2]  Steven Furnell,et al.  Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices , 2002, Comput. Secur..

[3]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[4]  Vladimir N. Vapnik,et al.  The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.

[5]  John J. Leggett,et al.  Verifying Identity via Keystroke Characteristics , 1988, Int. J. Man Mach. Stud..

[6]  Christopher M. Bishop,et al.  Neural networks for pattern recognition , 1995 .

[7]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[8]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[9]  Steven Furnell,et al.  Keystroke dynamics on a mobile handset: a feasibility study , 2003, Inf. Manag. Comput. Secur..

[10]  Sungzoon Cho,et al.  Web-Based Keystroke Dynamics Identity Verification Using Neural Network , 2000, J. Organ. Comput. Electron. Commer..

[11]  Mohammad S. Obaidat,et al.  A verification methodology for computer systems users , 1995, SAC '95.

[12]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[13]  Mohammad S. Obaidat,et al.  Performance of the perceptron algorithm for the classification of computer users , 1992, SAC '92.