Keystroke dynamics authentication for collaborative systems

We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards We focus in this paper on biometric based solutions that do not necessitate any additional sensor. Keystroke dynamics is an interesting solution as it uses only the keyboard and is invisible for users. Many methods have been published in this field. We make a comparative study of many of them considering the operational constraints of use for collaborative systems.

[1]  Alfred C. Weaver,et al.  Biometric authentication , 2006, Computer.

[2]  Christine L. MacKenzie,et al.  Computer user verification using login string keystroke dynamics , 1998, IEEE Trans. Syst. Man Cybern. Part A.

[3]  Sungzoon Cho,et al.  Keystroke dynamics identity verification - its problems and practical solutions , 2004, Comput. Secur..

[4]  Jarmo Ilonen Keystroke Dynamics , 2009, Encyclopedia of Biometrics.

[5]  Danoush Hosseinzadeh,et al.  Gaussian Mixture Modeling of Keystroke Patterns for Biometric Applications , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[6]  Takashi Matsumoto,et al.  Effectiveness of Pen Pressure, Azimuth, and Altitude Features for Online Signature Verification , 2007, ICB.

[7]  Ibrahim Sogukpinar,et al.  Understanding users' keystroke patterns for computer access security , 2003, Comput. Secur..

[8]  Terence Sim,et al.  Keystroke Dynamics in a General Setting , 2007, ICB.

[9]  Bir Bhanu,et al.  Individual recognition using gait energy image , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[10]  Geoffrey C. Fox,et al.  A collaborative framework for scientific data analysis and visualization , 2008, 2008 International Symposium on Collaborative Technologies and Systems.

[11]  Hyoungjoo Lee,et al.  Improving Authentication Accuracy of Unfamiliar Passwords with Pauses and Cues for Keystroke Dynamics-Based Authentication , 2006, WISI.

[12]  Lee Luan Ling,et al.  Biometric Access Control Through Numerical Keyboards Based on Keystroke Dynamics , 2006, ICB.

[13]  Philip J. Sallis,et al.  A system architecture for collaborative environmental modeling research , 2008, 2008 International Symposium on Collaborative Technologies and Systems.

[14]  Jean-Yves Ramel,et al.  User Classification for Keystroke Dynamics Authentication , 2007, ICB.

[15]  Ying Zhao,et al.  Learning User Keystroke Patterns for Authentication , 2008 .

[16]  Andy Adler,et al.  Comparing Human and Automatic Face Recognition Performance , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[17]  Kenneth Revett,et al.  On the Use of Rough Sets for User Authentication Via Keystroke Dynamics , 2007, EPIA Workshops.

[18]  David Umphress,et al.  Identity Verification Through Keyboard Characteristics , 1985, Int. J. Man Mach. Stud..

[19]  Claudia Picardi,et al.  User authentication through keystroke dynamics , 2002, TSEC.

[20]  Norman Shapiro,et al.  Authentication by Keystroke Timing: Some Preliminary Results , 1980 .

[21]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[22]  Jugurta R. Montalvão Filho,et al.  On the equalization of keystroke timing histograms , 2006, Pattern Recognit. Lett..

[23]  Fabian Monrose,et al.  Authentication via keystroke dynamics , 1997, CCS '97.

[24]  Mohammad S. Obaidat,et al.  Verification of computer users using keystroke dynamics , 1997, IEEE Trans. Syst. Man Cybern. Part B.

[25]  Steven Furnell,et al.  Advanced user authentication for mobile devices , 2007, Comput. Secur..

[26]  O. Coltell,et al.  Biometric identification system based on keyboard filtering , 1999, Proceedings IEEE 33rd Annual 1999 International Carnahan Conference on Security Technology (Cat. No.99CH36303).