Abstract
This paper illustrated one unique measure of keystroke patterns of user typing to prevent insider threats with combination of existing keystroke credentials. While insider threats may never be eliminated, it is worth noting that risk-mitigating counter measures exist. Every organization’s security architecture must take insider threat into account. As reiterated trough out the security industry, defense in depth is the essential. Defense in depth requires security professional to take a layered approach to protecting information. In essence, we should never rely on just one security method or technology. Only user ID and passwords are not enough strong now a day to protect workstations from unauthorized access. Being remarkable advantages and to support multilevel authentication biometrics may be strong add-on. Recent research on behavioral biometrics i.e., keystroke dynamics proves its efficiency for stronger authentication. With numerous advantages keystroke pattern credential are employing in many organization to establish layered security mechanism. Work of last decade on keystroke dynamics also reveals some drawbacks. So research is going on to find more traits of user typing for more efficient authentication. Through this paper we proposed and experimentally proved one measure of keystroke pattern which is distinctive for each user and can make keystroke pattern credential stronger.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Klein D (1990) Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX security workshop, Aug 1990
Ahmed AAE, Traore I (2005) Anomaly intrusion detection based on biometrics," Information assurance workshop, IAW ‘05. Proceedings from the sixth annual IEEE SMC, pp 452–453, 15–17 June 2005
Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol, Spec Issue on Image Video-Based Biometrics 14(1)
Monrose F, Rubin A (1997) Authentication via keystroke dynamics. 4th ACM conference on computer and communications security, pp 48–56
Postley HJ, Bender SS (2007) Key sequence rhythm recognition system and method. US patent 7,206,938
Revett K (2009) A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control Autom Syst 7(1):7–15
Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397
Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics ACM ACM Trans Inf Syst Secur 5(4):367–397
Umphress D, Williams G (1985) Identity verification through key-board characteristics. Int J Man Mach Stud 23(3):263–274
Joyce R, Gupta G (1990) Identity authorization based on keystroke latencies. Commun ACM 33(2):168–176
Brown M, Rogers SJ (1994) A practical approach to user authentication. Computer security applications conference, 1994. Proceedings of 10th annual, pp 108–116, 5-9 Dec 1994
Obaidat MS, Sadoun B (1997) Verification of Computer Users Using Keystroke Dynamics. IEEE Trans Syst Man Cybern-Part B 24(2):261–269
Martı J et al (2007) Recognizing individual typing patterns IbPRIA 2007, Part II, LNCS 4478, 323–330
Rudrapal D et al (2012) A study and analysis of keystroke dynamics and its enhancement for proficient user authentication ICECT-2012, Apr 6–8th
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Rudrapal, D., Das, S. (2013). Analysis and Evaluation of Keystroke Duration of User’s Typing as a Distinctive Measure of Recognition. In: S, M., Kumar, S. (eds) Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012). Lecture Notes in Electrical Engineering, vol 221. Springer, India. https://doi.org/10.1007/978-81-322-0997-3_34
Download citation
DOI: https://doi.org/10.1007/978-81-322-0997-3_34
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-0996-6
Online ISBN: 978-81-322-0997-3
eBook Packages: EngineeringEngineering (R0)