Skip to main content

Keystroke Data Classification for Computer User Profiling and Verification

  • Conference paper
  • First Online:
Computational Collective Intelligence

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9330))

Abstract

The article addresses the issues of behavioral biometrics. Presented research concerns an analysis of a user activity related to a keyboard use in a computer system. A method of computer user profiling based on encrypted keystrokes is introduced to ensure a high level of users data protection. User’s continuous work in a computer system is analyzed. This type of analysis constitutes a type of free-text analysis. Additionally, an attempt to user verification in order to detect intruders is performed. Intrusion detection is based on a modified k-NN classifier and different distance measures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Alsultan, A., Warwick, K.: Keystroke Dynamics Authentication: A Survey of Free-text Methods. J. of Computer Science Issues 10(4), 1–10 (2013). No. 1

    Google Scholar 

  2. Araujo, L.C.F., Sucupira Jr, L.H.R., Lizarraga, M.G., Ling, L.L., Yabu-Uti, J.B.T.: User Authentication Through Typing Biometrics Features. IEEE Transactions on Signal Processing 53(2), 851–855 (2005)

    Article  MathSciNet  Google Scholar 

  3. Banerjee, S.P., Woodard, D.L.: Biometric Authentication and Identification Using Keystroke Dynamics: A survey. J. of Pattern Recognition Research 7, 116–139 (2012)

    Article  Google Scholar 

  4. Dowland, P.S., Singh, H., Furnell, S.M.: A preliminary investigation of user authentication using continuous keystroke analysis. In: The 8th Annual Working Conference on Information Security Management and Small Systems Security (2001)

    Google Scholar 

  5. Filho, J.R.M., Freire, E.O.: On the Equalization of Keystroke Timing Histogram. Pattern Recognition Letters 27(13), 1440–1446 (2006)

    Article  Google Scholar 

  6. Foster, K.R., Koprowski, R., Skufca, J.D.: Machine learning, medical diagnosis, and biomedical engineering research - commentary. Biomedical Engineering Online 13, Article No. 94 (2014). doi:10.1186/1475-925X-13-94

  7. Gunetti, D., Picardi, C., Ruffo, G.: Keystroke analysis of different languages: a case study. In: Famili, A.F., Kok, J.N., Peña, J.M., Siebes, A., Feelders, A. (eds.) IDA 2005. LNCS, vol. 3646, pp. 133–144. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  8. Hu, J., Gingrich, D., Sentosa, A.: A k-nearest neighbor approach for user authentication through biometric keystroke dynamics. In: IEEE International Conference on Communications, pp. 1556–1560 (2008)

    Google Scholar 

  9. Killourhy, K.S., Maxion, R.A.: Comparing anomaly-detection algorithms for keystroke dynamics. In: International Conference on Dependable Systems & Networks (DSN 2009), pp. 125–134. IEEE Computer Society Press (2009)

    Google Scholar 

  10. Krawczyk, K., Woźniak, M., Cyganek, B.: Clustering-based ensembles for one-class classification. Information Sciences 264, 182–195 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Kudłacik, P., Porwik, P.: A new approach to signature recognition using the fuzzy method. Pattern Analysis & Applications 17(3), 451–463 (2014). doi:10.1007/s10044-012-0283-9

    Article  MathSciNet  MATH  Google Scholar 

  12. Kudłacik, P., Porwik, P., Wesołowski, T.: Fuzzy Approach for Intrusion Detection Based on User’s Commands. Soft Computing. Springer-Verlag, Heidelberg (2015). doi:10.1007/s00500-015-1669-6

  13. Lopatka, M., Peetz, M.: Vibration sensitive keystroke analysis. In: Proc. of The 18th Annual Belgian-Dutch Conference on Machine Learning, pp. 75–80 (2009)

    Google Scholar 

  14. Płys, M., Doroz, R., Porwik, P.: On-line signature recognition based on an analysis of dynamic feature. In: IEEE International Conference on Biometrics and Kansei Engineering, pp. 103–107. Tokyo Metropolitan University Akihabara (2013)

    Google Scholar 

  15. Teh, P.S., Teoh, A.B.J., Yue, S.: A Survey of Keystroke Dynamics Biometrics. The Scientific World Journal 2013, Article ID 408280, 24 (2013) . doi:10.1155/2013/408280

  16. Porwik, P., Doroz, R., Orczyk, T.: The k-NN classifier and self-adaptive Hotelling data reduction technique in handwritten signatures recognition. Pattern Analysis and Applications. doi:10.1007/s10044-014-0419-1

  17. Raiyn, J.: A survey of cyber attack detection strategies. International J. of Security and Its Applications 8(1), 247–256 (2014)

    Article  Google Scholar 

  18. Salem, M.B., Hershkop, S., Stolfo, S.J.: A survey of insider attack detection research. In: Advances in Information Security, vol. 39, pp. 69–90. Springer, US (2008)

    Google Scholar 

  19. Tappert, C.C., Villiani, M., Cha, S.: Keystroke biometric identification and authentication on long-text input. In: Wang, L., Geng, X. (eds.) Behavioral Biometrics for Human Identification: Intelligent Applications, pp. 342–367 (2010). doi:10.4018/978-1-60566-725-6.ch016

  20. Wesolowski, T., Palys, M., Kudlacik, P.: Computer user verification based on mouse activity analysis. In: Barbucha, D., Nguyen, N.T., Batubara, J. (eds.) New Trends in Intelligent Information and Database Systems. SCI, vol. 598, pp. 61–70. Springer, Heidelberg (2015)

    Google Scholar 

  21. Zhong, Y., Deng, Y., Jain, A.K.: Keystroke dynamics for user authentication. In: IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 117–123 (2012). doi:10.1109/CVPRW.2012.6239225

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tomasz Emanuel Wesołowski .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Wesołowski, T.E., Porwik, P. (2015). Keystroke Data Classification for Computer User Profiling and Verification. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24306-1_57

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24305-4

  • Online ISBN: 978-3-319-24306-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics