Keystroke Dynamics in a General Setting

It is well known that Keystroke Dynamics can be used as a biometric to authenticate users. But most work to date use fixed strings, such as userid or password. In this paper, we study the feasibility of using Keystroke Dynamics as a biometric in a more general setting, where users go about their normal daily activities of emailing, web surfing, and so on. We design two classifiers that appropriate for one-time and continuous authentication. We also propose a new Goodness Measure to compute the quality of a word used for Keystroke Dynamics. From our experiments we find that, surprisingly, non-English words are better suited for identification than English words.

[1]  Anil K. Jain Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..

[2]  Sung-Hyuk Cha,et al.  Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[3]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[4]  Yunheung Paek,et al.  Advances in Computer Systems Architecture, 12th Asia-Pacific Conference, ACSAC 2007, Seoul, Korea, August 23-25, 2007, Proceedings , 2007, Asia-Pacific Computer Systems Architecture Conference.

[5]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[6]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[7]  M. S. Obaidat,et al.  Keystroke Dynamics Based Authentication , 1996 .

[8]  Michael K. Reiter,et al.  Password hardening based on keystroke dynamics , 1999, CCS '99.

[9]  John J. Leggett,et al.  Dynamic Identity Verification via Keystroke Characteristics , 1991, Int. J. Man Mach. Stud..

[10]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[11]  Sandeep Kumar,et al.  Using continuous biometric verification to protect interactive login sessions , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[12]  S. J. Shepherd Continuous authentication by analysis of keyboard typing characteristics , 1995 .

[13]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[14]  David G. Stork,et al.  Pattern Classification , 1973 .