Abstract
Due to the rapid development of Internet and web-based application the number of system which an ordinary user needs to interact grows almost proportionally. People are expected to make bank transfers, send emails using multiple mailboxes, send tax declarations, send birthday wishes solely online. What is more, sometimes only this way being available. The sensitivity of information created using online tools is unquestionable and the highest possible level of data security is therefore expected not only on a corporate level, but also it should be guaranteed to ordinary users. That is the reason why a convenient solution, that do not require any additional expensive equipment (e.g. RFID cards, fingerprint readers, retinal scanners), can assure such security is highly wanted. Therefore, a number of publications have been devoted to methods of user authentication based on their biometrical characteristics (that are obviously individual and can be easily used to encrypt users’ credentials) and one potentially most accessible group of methods is build on top of analysis of users’ personal typing styles. This paper is a presentation of a data evolution method used in our novel biometrical authentication procedure and contains a statistical analysis of the conducted experimental verification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Azevedo, G.L., Cavalcanti, G.D., Filho, E.C.B.: Hybrid solution for the feature selection in personal identification problems through keystroke dynamics. In: International Joint Conference on Neural Networks, IJCNN 2007, pp. 1947–1952. IEEE (2007)
Banerjee, S.P., Woodard, D.L.: Biometric authentication and identification using keystroke dynamics: a survey. J. Pattern Recogn. Res. 7, 116–139 (2012)
Carpenter, G.A., Grossberg, S.: Adaptive Resonance Theory. Springer, Heidelberg (2011)
Gaines, R., Press, S., Lisowski, W., Shapiro, N.: Authentication by keystroke timing. Rand Report (1980)
Gunetti, D., Picardi, C.: Keystroke analysis of free text. ACM Trans. Inf. Syst. Secur. (TISSEC) 8(3), 312–347 (2005)
Guven, A., Sogukpinar, I.: Understanding users’ keystroke patterns for computer access security. Comput. Secur. 22(8), 695–706 (2003)
Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4–20 (2004)
Joyce, R., Gupta, G.: Identity authentication based on keystroke latencies. Commun. ACM 33(2), 168–176 (1990)
Kozierkiewicz-Hetmańska A., Marciniak A., Pietranik M.: User authentication method based on keystroke dynamics, Paper submitted on ICCCI 2016 conference (2016)
De Magalhães, S.T., Revett, K., Santos, H.: Password secured sites-stepping forward with keystroke dynamics. In: International Conference on Next Generation Web Services Practices, NWeSP 2005. IEEE (2005)
Marciniak A.: Uwierzytelnianie użytkowników oparte o analizę dynamiki pisania na klawiaturze. Master thesis (2016, in Polish)
Monrose F., Rubin A.: Authentication via keystroke dynamics. In: Proceedings of the 4th ACM Conference on Computer and Communications Security, pp. 48–56 (1997)
Montalvao, J., Almeida, C.A.S., Freire, E.O.: Equalization of keystroke timing histograms for improved identification performance. In: 2006 International Telecommunications Symposium, pp. 560–565. IEEE (2006)
Revett, K.: A bioinformatics based approach to behavioural biometrics. In: Frontiers in the Convergence of Bioscience and Information Technologies, FBIT 2007, pp. 665–670. IEEE (2007)
Robinson, J.A., Liang, V.M., Chambers, J., MacKenzie, C.L.: Computer user verification using login string keystroke dynamics. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 28(2), 236–241 (1998)
Theodoridis, S., Koutroumbas, K.: Pattern Recognition. Elsevier (2009)
Yong, S., Lai, W.-K., Goghill, G.: Weightless neural networks for typing biometrics authentication. In: Negoita, M.G., Howlett, R.J., Jain, L.C. (eds.) KES 2004. LNCS(LNAI), vol. 3214, pp. 284–293. Springer, Heidelberg (2004)
Yu, E., Cho, S.: Keystroke dynamics identity verification—its problems and practical solutions. Comput. Secur. 23(5), 428–440 (2004)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Kozierkiewicz-Hetmanska, A., Marciniak, A., Pietranik, M. (2016). Data Evolution Method in the Procedure of User Authentication Using Keystroke Dynamics. In: Nguyen, NT., Iliadis, L., Manolopoulos, Y., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2016. Lecture Notes in Computer Science(), vol 9875. Springer, Cham. https://doi.org/10.1007/978-3-319-45243-2_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-45243-2_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45242-5
Online ISBN: 978-3-319-45243-2
eBook Packages: Computer ScienceComputer Science (R0)