Authentication and Identification Methods Used in Keystroke Biometric Systems

Keystroke dynamics authentication is not as widely used compared to other biometric systems. In recent years, keystroke dynamic authentication systems have gained interest because of low cost and integration with existing security systems. Many different methods have been proposed for data collection, feature representation, classification, and performance evaluation. The work presents a detailed survey of the most recent research in keystroke dynamic authentication. Research is evaluated by the conditions under which data was collected, classification algorithms used, and system performance. This work also identifies some shortcomings of the current research issues that need to be addressed for keystroke dynamics to mature. Some recommendations for future research are made, with the goal of improving keystroke dynamics system performance and robustness.

[1]  Andrew Beng Jin Teoh,et al.  A multiple layer fusion approach on keystroke dynamics , 2009, Pattern Analysis and Applications.

[2]  Roy A. Maxion,et al.  Why Did My Detector Do That?! - Predicting Keystroke-Dynamics Error Rates , 2010, RAID.

[3]  Kenneth Revett,et al.  On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.

[4]  Masahito Kurihara,et al.  Sensing Pressure for Authentication System Using Keystroke Dynamics , 2004, International Conference on Computational Intelligence.

[5]  N.M. White,et al.  Use of a Novel Keypad Biometric for Enhanced User Identity Verification , 2008, 2008 IEEE Instrumentation and Measurement Technology Conference.

[6]  Alessandro Neri,et al.  User authentication using keystroke dynamics for cellular phones , 2009 .

[7]  Sungzoon Cho,et al.  User authentication based on keystroke analysis of long free texts with a reduced number of features , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.

[8]  Haruhiko Nishimura,et al.  Keystroke timing analysis for personal authentication in Japanese long text input , 2011, SICE Annual Conference 2011.

[9]  Sungzoon Cho,et al.  Novelty Detection Approach for Keystroke Dynamics Identity Verification , 2003, IDEAL.

[10]  Margit Antal,et al.  Keystroke Dynamics on Android Platform , 2015 .

[11]  Christophe Rosenberger,et al.  Analysis of template update strategies for keystroke dynamics , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[12]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[13]  Damon L. Woodard,et al.  Biometric Authentication and Identification using Keystroke Dynamics: A Survey , 2012 .

[14]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[15]  Vir V. Phoha,et al.  Utilizing linguistically enhanced keystroke dynamics to predict typist cognition and demographics , 2015, Int. J. Hum. Comput. Stud..

[16]  Gopal K. Gupta,et al.  Identity authentication based on keystroke latencies , 1990, Commun. ACM.

[17]  Sahin Albayrak,et al.  Continuous and non-intrusive identity verification in real-time environments based on free-text keystroke dynamics , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[18]  Roy A. Maxion,et al.  Comparing anomaly-detection algorithms for keystroke dynamics , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[19]  Julian Fiérrez,et al.  One-handed Keystroke Biometric Identification Competition , 2015, 2015 International Conference on Biometrics (ICB).

[20]  Christophe Rosenberger,et al.  Keystroke dynamics with low constraints SVM based passphrase enrollment , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[21]  Yoshihiro Kaneko,et al.  A hamming distance-like filtering in keystroke dynamics , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.

[22]  Sung-Hyuk Cha,et al.  A Keystroke Biometric Systemfor Long-Text Input , 2010, Int. J. Inf. Secur. Priv..

[23]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[24]  Baochang Zhang,et al.  Study on the BeiHang Keystroke Dynamics Database , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[25]  Jiang Zhu,et al.  KeySens: Passive User Authentication through Micro-behavior Modeling of Soft Keyboard Interaction , 2013, MobiCASE.

[26]  Nathan Clarke,et al.  Deployment of Keystroke Analysis on a Smartphone , 2008 .

[27]  Sungzoon Cho,et al.  Keystroke dynamics-based authentication for mobile devices , 2009, Comput. Secur..

[28]  Christophe Rosenberger,et al.  GREYC keystroke: A benchmark for keystroke dynamics biometric systems , 2009, 2009 IEEE 3rd International Conference on Biometrics: Theory, Applications, and Systems.

[29]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[30]  Saurabh Singh,et al.  Key Classification: A New Approach in Free Text Keystroke Authentication System , 2011, 2011 Third Pacific-Asia Conference on Circuits, Communications and System (PACCS).

[31]  Ying Zhao,et al.  Learning User Keystroke Patterns for Authentication , 2008 .

[32]  Heather Crawford Keystroke dynamics: Characteristics and opportunities , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[33]  Christophe Rosenberger,et al.  Keystroke dynamics authentication for collaborative systems , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[34]  I. V. McLoughlin,et al.  Keypress biometrics for user validation in mobile consumer devices , 2009, 2009 IEEE 13th International Symposium on Consumer Electronics.

[35]  Sung-Hyuk Cha,et al.  A Keystroke Biometric System for Long-Text Input , 2013 .

[36]  Sung-Hyuk Cha,et al.  Behavioral biometric verification of student identity in online course assessment and authentication of authors in literary works , 2013, 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[37]  Lior Rokach,et al.  Continuous Verification Using Keystroke Dynamics , 2010, 2010 International Conference on Computational Intelligence and Security.

[38]  Mohammad S. Obaidat,et al.  Computer users verification using the perceptron algorithm , 1993, IEEE Trans. Syst. Man Cybern..

[39]  Chee Peng Lim,et al.  Keystroke Patterns Classification Using the ARTMAP-FD Neural Network , 2007, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007).

[40]  Sung-Hyuk Cha,et al.  Keystroke Biometric Recognition Studies on Long-Text Input under Ideal and Application-Oriented Conditions , 2006, 2006 Conference on Computer Vision and Pattern Recognition Workshop (CVPRW'06).

[41]  Jan R. Magnus,et al.  The reliability of user authentication through keystroke dynamics , 2009 .

[42]  N. Pavaday,et al.  Investigating performance of neural networks in authentication using keystroke dynamics , 2007, AFRICON 2007.

[43]  Roy A. Maxion,et al.  Keystroke biometrics with number-pad input , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).

[44]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[45]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[46]  Wahyudi,et al.  Keystroke pressure based typing biometrics authentication system by combining ANN and ANFIS-based classifiers , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.

[47]  Wahyudi,et al.  Keystroke Pressure-Based Typing Biometrics Authentication System Using Support Vector Machines , 2007, ICCSA.

[48]  George D. C. Cavalcanti,et al.  An approach to feature selection for keystroke dynamics systems based on PSO and feature weighting , 2007, 2007 IEEE Congress on Evolutionary Computation.

[49]  Sung-Hyuk Cha,et al.  Performance of a long-text-input keystroke biometric authentication system using an improved k-nearest-neighbor classification method , 2010, 2010 Fourth IEEE International Conference on Biometrics: Theory, Applications and Systems (BTAS).

[50]  Jani Mäntyjärvi,et al.  Keystroke recognition for virtual keyboard , 2002, Proceedings. IEEE International Conference on Multimedia and Expo.

[51]  Wahyudi,et al.  Intelligent keystroke pressure-based typing biometrics authentication system using radial basis function network , 2009, 2009 5th International Colloquium on Signal Processing & Its Applications.

[52]  Baptiste Hemery,et al.  Unconstrained keystroke dynamics authentication with shared secret , 2011, Comput. Secur..

[53]  Wai Lok Woo,et al.  Performance of keystroke biometrics authentication system using Multilayer Perceptron neural network (MLP NN) , 2010, 2010 7th International Symposium on Communication Systems, Networks & Digital Signal Processing (CSNDSP 2010).

[54]  Uno Andre Johansen Keystroke Dynamics on a Device with Touch Screen , 2012 .

[55]  Kartik Muralidharan,et al.  Putting ‘pressure’ on mobile authentication , 2014, 2014 Seventh International Conference on Mobile Computing and Ubiquitous Networking (ICMU).

[56]  Mohammad S. Obaidat,et al.  A verification methodology for computer systems users , 1995, SAC '95.

[57]  Yong Sheng,et al.  A parallel decision tree-based method for user authentication based on keystroke patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[58]  Xian Ke,et al.  Typing patterns: a key to user identification , 2004, IEEE Security & Privacy Magazine.

[59]  Kentaro Kotani,et al.  Evaluation on a keystroke authentication system by keying force incorporated with temporal characteristics of keystroke dynamics , 2005, Behav. Inf. Technol..

[60]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[61]  M. Akila,et al.  Personal Authentication Based on Keystroke Dynamics Using Soft Computing Techniques , 2010, 2010 Second International Conference on Communication Software and Networks.

[62]  Thai Hoang Le,et al.  Keystroke Dynamics Extraction by Independent Component Analysis and Bio-matrix for User Authentication , 2010, PRICAI.

[63]  Claudia Picardi,et al.  Keystroke analysis of free text , 2005, TSEC.

[64]  Andrew Beng Jin Teoh,et al.  A Survey of Keystroke Dynamics Biometrics , 2013, TheScientificWorldJournal.

[65]  P. Bhattarakosol,et al.  Authenticating User Using Keystroke Dynamics and Finger Pressure , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[66]  Kiran S. Balagani,et al.  Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes , 2011, CVPR 2011 WORKSHOPS.

[67]  Daw-Tung Lin Computer-access authentication with neural network based keystroke identity verification , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).

[68]  Asok Ray,et al.  On the discriminability of keystroke feature vectors used in fixed text keystroke authentication , 2011, Pattern Recognit. Lett..

[69]  S. Salerno,et al.  USER AUTHENTICATION WITH NEURAL NETWORKS , 1999 .

[70]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[71]  Sung-Hyuk Cha,et al.  Keystroke Biometric Studies on Password and Numeric Keypad Input , 2013, 2013 European Intelligence and Security Informatics Conference.

[72]  Sung-Hyuk Cha,et al.  An investigation of keystroke and stylometry traits for authenticating online test takers , 2011, 2011 International Joint Conference on Biometrics (IJCB).

[73]  Konrad Rieck,et al.  Continuous Authentication on Mobile Devices by Analysis of Typing Motion Behavior , 2014, Sicherheit.

[74]  Giancarlo Ruffo,et al.  Keystroke Analysis of Different Languages: A Case Study , 2005, IDA.

[75]  Christine L. MacKenzie,et al.  Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[76]  Sungzoon Cho,et al.  Continual Retraining of Keystroke Dynamics Based Authenticator , 2007, ICB.