Abstract
In an effort to confront the challenges brought forward by the increased need for access control, we present an improved technique for authorized access to computer system resources and data via keystroke dynamics. A database of keystrokes of login ids and passwords collected from 38 users is constructed. From the samples collected, signatures were formed using three membership functions of Fuzzy Logic. Users were authenticated by comparing the typing pattern to their respective signatures. We have included the usage of the SHIFT and the CAPS LOCK keys as part of the feature sets. We analyzed the performance of the three membership functions of Fuzzy Logic based on features like FAR and FRR to evaluate the efficiency of the detection algorithms. The paper presents the results of the analysis thereby providing an inexpensive method of intrusion detection as compared to other behavioral biometric methods.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Maxion RA, Killourhy KS (2010) Keystroke biometrics with number-pad input, Computer Science Department, Carnegie Mellon University
Haider S, Abbas A, Zaidi AK (2000) A multi-technique approach for user identification through keystroke dynamics. In: IEEE international conference on systems, man and cybernetics
Killourhy KS, RA Maxion Comparing anomaly-detection algorithms for keystroke dynamics
Forsen G, Nelson M, Staron R Jr (1977) Personal attributes authentication techniques. Technical Report RADC-TR-77-333, Rome Air Development Center
Ahmed Awad EA, Traore I Detecting computer intrusions using behavioural biometrics
Monrose F, Rubin AD (1999) Authentication via keystroke dynamics
Killourhy KS (2012) A scientific understanding of keystroke dynamics
Joyce and G. Gupta (1990) Identity authentication based on keystroke latencies. Commun ACM
Ahmed AAE, Traore I Department of Electrical and Computer Engineering, University of Victoria. Detecting computer intrusions using behavioural biometrics
Lane Department of Computer Science and Electrical Engineering (2005) Morgantown, West Virginia, Username and password verification through keystroke dynamics
Duda RO, Hart PE, Stork DG (2001) Pattern classification, 2nd edn. Wiley
Mandal SN, Choudhury JP, De D, Chaudhuri SRB (2008) Roll of membership functions in fuzzy logic for prediction of shoot length of mustard plant based on residual analysis
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this paper
Cite this paper
Sridhar, M., Abraham, T., Rebello, J., D’souza, W., D’Souza, A. (2013). Intrusion Detection Using Keystroke Dynamics. In: Das, V. (eds) Proceedings of the Third International Conference on Trends in Information, Telecommunication and Computing. Lecture Notes in Electrical Engineering, vol 150. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3363-7_16
Download citation
DOI: https://doi.org/10.1007/978-1-4614-3363-7_16
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-3362-0
Online ISBN: 978-1-4614-3363-7
eBook Packages: EngineeringEngineering (R0)