Skip to main content

Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2016)

Abstract

Due to the rapid development of Internet and web-based application the number of system which an ordinary user needs to interact grows almost proportionally. People are expected to make bank transfers, send emails using multiple mailboxes, send tax declarations, send birthday wishes solely online. What is more, sometimes only this way being available. The sensitivity of information created using online tools is unquestionable and the highest possible level of data security is therefore expected not only on a corporate level, but also it should be guaranteed to ordinary users. That is the reason why a convenient solution, that do not require any additional expensive equipment (e.g. RFID cards, fingerprint readers, retinal scanners), can assure such security is highly wanted. Therefore, a number of publications have been devoted to methods of user authentication based on their biometrical characteristics (that are obviously individual and can be easily used to encrypt users’ credentials) and one potentially most accessible group of methods is build on top of analysis of users’ personal typing styles. This paper is a presentation of a data evolution method used in our novel biometrical authentication procedure and contains a statistical analysis of the conducted experimental verification.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Azevedo, G.L., Cavalcanti, G.D., Filho, E.C.B.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, IJCNN 2007, pp. 1947–1952. IEEE (2007)

    Google Scholar 

  2. Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)

    Article  Google Scholar 

  3. Carpenter, G.A., Grossberg, S.: Adaptive Resonance Theory. Springer, Heidelberg (2011)

    Google Scholar 

  4. Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report (1980)

    Google Scholar 

  5. Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)

    Article  MATH  Google Scholar 

  6. Guven, A., Sogukpinar, I.: Understanding users’ keystroke patterns for computer access security. Comput. Secur. 22(8), 695–706 (2003)

    Article  Google Scholar 

  7. Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)

    Article  Google Scholar 

  8. Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)

    Article  Google Scholar 

  9. Kozierkiewicz-Hetmańska A., Marciniak A., Pietranik M.: User authentication method based on keystroke dynamics, Paper submitted on ICCCI 2016 conference (2016)

    Google Scholar 

  10. De Magalhães, S.T., Revett, K., Santos, H.: Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices, NWeSP 2005. IEEE (2005)

    Google Scholar 

  11. Marciniak A.: Uwierzytelnianie użytkowników oparte o analizę dynamiki pisania na klawiaturze. Master thesis (2016, in Polish)

    Google Scholar 

  12. Monrose F., Rubin A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)

    Google Scholar 

  13. Montalvao, J., Almeida, C.A.S., Freire, E.O.: Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, pp. 560–565. IEEE (2006)

    Google Scholar 

  14. Revett, K.: A bioinformatics based approach to behavioural biometrics. In: Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007, pp. 665–670. IEEE (2007)

    Google Scholar 

  15. Robinson, J.A., Liang, V.M., Chambers, J., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 28(2), 236–241 (1998)

    Article  Google Scholar 

  16. Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier (2009)

    Google Scholar 

  17. Yong, S., Lai, W.-K., Goghill, G.: Weightless neural networks for typing biometrics authentication. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS(LNAI), vol. 3214, pp. 284–293. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Comput. Secur. 23(5), 428–440 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adrianna Kozierkiewicz-Hetmanska .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M. (2016). Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics. In: Nguyen, NT., Iliadis, L., Manolopoulos, Y., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2016. Lecture Notes in Computer Science(), vol 9875. Springer, Cham. https://doi.org/10.1007/978-3-319-45243-2_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45243-2_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45242-5

  • Online ISBN: 978-3-319-45243-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics