An Exploration of Keystroke Dynamics Authentication Using Non-fixed Text of Various Length

User authentication is an important problem for any restricted access computer system, especially with remote access. Constant spread of Internet makes efficient remote authentication a pressing issue with remote interaction providing additional difficulties. Authentication methods based on most biometrics techniques mostly require dedicated hardware that is unhandy for remote applications. Keystroke dynamics however requires uniquely dedicated software and no indispensable dedicated hardware. The approach proposed by the authors in this paper is aimed at efficient user authentication with keystroke dynamics using non-fixed text of various size. We have tested the approach on a small group of individuals, with data gathered in various ways: over Internet using browser-based WWW application and on local machines using dedicated applications. The obtained results cans be used as indication for future keystrokes database creation.

[1]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[2]  Chee Peng Lim,et al.  Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[3]  Richard O. Duda,et al.  Pattern classification and scene analysis , 1974, A Wiley-Interscience publication.

[4]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[5]  Simon Haykin,et al.  Neural Networks: A Comprehensive Foundation , 1998 .

[6]  Yang Wang,et al.  A Model for User Authentication Based on Manner of Keystroke and Principal Component Analysis , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[7]  Khalid Saeed,et al.  User Authentication with Keystroke Dynamics Using Fixed Text , 2009, 2009 International Conference on Biometrics and Kansei Engineering.

[8]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[9]  Khalid Saeed,et al.  A Keystroke Dynamics Based System for User Identification , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[10]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[11]  Anil K. Jain Biometric recognition: how do I know who you are? , 2004, Proceedings of the IEEE 12th Signal Processing and Communications Applications Conference, 2004..

[12]  Roy A. Maxion,et al.  The Effect of Clock Resolution on Keystroke Dynamics , 2008, RAID.

[13]  Stephen M. Stigler,et al.  Thomas Bayes's Bayesian Inference , 1982 .

[14]  Khalid Saeed,et al.  Advances in the Keystroke Dynamics: The Practical Impact of Database Quality , 2012, CISIM.