Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 150))

Abstract

In an effort to confront the challenges brought forward by the increased need for access control, we present an improved technique for authorized access to computer system resources and data via keystroke dynamics. A database of keystrokes of login ids and passwords collected from 38 users is constructed. From the samples collected, signatures were formed using three membership functions of Fuzzy Logic. Users were authenticated by comparing the typing pattern to their respective signatures. We have included the usage of the SHIFT and the CAPS LOCK keys as part of the feature sets. We analyzed the performance of the three membership functions of Fuzzy Logic based on features like FAR and FRR to evaluate the efficiency of the detection algorithms. The paper presents the results of the analysis thereby providing an inexpensive method of intrusion detection as compared to other behavioral biometric methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Maxion RA, Killourhy KS (2010) Keystroke biometrics with number-pad input, Computer Science Department, Carnegie Mellon University

    Google Scholar 

  2. Haider S, Abbas A, Zaidi AK (2000) A multi-technique approach for user identification through keystroke dynamics. In: IEEE international conference on systems, man and cybernetics

    Google Scholar 

  3. Killourhy KS, RA Maxion Comparing anomaly-detection algorithms for keystroke dynamics

    Google Scholar 

  4. Forsen G, Nelson M, Staron R Jr (1977) Personal attributes authentication techniques. Technical Report RADC-TR-77-333, Rome Air Development Center

    Google Scholar 

  5. Ahmed Awad EA, Traore I Detecting computer intrusions using behavioural biometrics

    Google Scholar 

  6. Monrose F, Rubin AD (1999) Authentication via keystroke dynamics

    Google Scholar 

  7. Killourhy KS (2012) A scientific understanding of keystroke dynamics

    Google Scholar 

  8. Joyce and G. Gupta (1990) Identity authentication based on keystroke latencies. Commun ACM

    Google Scholar 

  9. Ahmed AAE, Traore I Department of Electrical and Computer Engineering, University of Victoria. Detecting computer intrusions using behavioural biometrics

    Google Scholar 

  10. Lane Department of Computer Science and Electrical Engineering (2005) Morgantown, West Virginia, Username and password verification through keystroke dynamics

    Google Scholar 

  11. Duda RO, Hart PE, Stork DG (2001) Pattern classification, 2nd edn. Wiley

    Google Scholar 

  12. Mandal SN, Choudhury JP, De D, Chaudhuri SRB (2008) Roll of membership functions in fuzzy logic for prediction of shoot length of mustard plant based on residual analysis

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mahalaxmi Sridhar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this paper

Cite this paper

Sridhar, M., Abraham, T., Rebello, J., D’souza, W., D’Souza, A. (2013). Intrusion Detection Using Keystroke Dynamics. In: Das, V. (eds) Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing. Lecture Notes in Electrical Engineering, vol 150. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3363-7_16

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3363-7_16

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3362-0

  • Online ISBN: 978-1-4614-3363-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics