Time signatures - an implementation of Keystroke and click patterns for practical and secure authentication

The analysis of keystroke dynamics (KD) is a developing biometric technique for user authentication. In computer security, its use is limited to some constraints such as longer typing and practice sessions. In this paper, a practical user authentication system is proposed that combines a conventional login/password method and a said biometric technique. The conventional password authentication method is enhanced through analysis of keystroke dynamics (KD) and click patterns (CP). In this way increased security level is achieved without using long and complicated passwords. For this, an application is developed to demonstrate the technique and the results are analyzed. user time signatures (TS) are identified after analyzing user KD and CP. Based on ability to follow their specific TS, users are categorized into beginner, standard and expert. At the time of login, the user inputs are matched with respective database records for authentication.

[1]  Bojan Cukic,et al.  Evaluating the Reliability of Credential Hardening through Keystroke Dynamics , 2006, 2006 17th International Symposium on Software Reliability Engineering.

[2]  Marcus Brown,et al.  A practical approach to user authentication , 1994, Tenth Annual Computer Security Applications Conference.

[3]  I. Traore,et al.  Anomaly intrusion detection based on biometrics , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.

[4]  Sajjad Haider,et al.  A multi-technique approach for user identification through keystroke dynamics , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[5]  Jarmo Ilonen Keystroke Dynamics , 2009, Encyclopedia of Biometrics.

[6]  Lai Weng Kin,et al.  Enhanced user authentication through typing biometrics with artificial neural networks and k-nearest neighbor algorithm , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).

[7]  Sungzoon Cho,et al.  GA-SVM wrapper approach for feature subset selection in keystroke dynamics identity verification , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[8]  Tai-Hoon Cho Pattern Classification Methods for Keystroke Analysis , 2006, 2006 SICE-ICASE International Joint Conference.