Skip to main content

Analysis and Evaluation of Keystroke Duration of User’s Typing as a Distinctive Measure of Recognition

  • Conference paper
  • First Online:
Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 221))

Abstract

This paper illustrated one unique measure of keystroke patterns of user typing to prevent insider threats with combination of existing keystroke credentials. While insider threats may never be eliminated, it is worth noting that risk-mitigating counter measures exist. Every organization’s security architecture must take insider threat into account. As reiterated trough out the security industry, defense in depth is the essential. Defense in depth requires security professional to take a layered approach to protecting information. In essence, we should never rely on just one security method or technology. Only user ID and passwords are not enough strong now a day to protect workstations from unauthorized access. Being remarkable advantages and to support multilevel authentication biometrics may be strong add-on. Recent research on behavioral biometrics i.e., keystroke dynamics proves its efficiency for stronger authentication. With numerous advantages keystroke pattern credential are employing in many organization to establish layered security mechanism. Work of last decade on keystroke dynamics also reveals some drawbacks. So research is going on to find more traits of user typing for more efficient authentication. Through this paper we proposed and experimentally proved one measure of keystroke pattern which is distinctive for each user and can make keystroke pattern credential stronger.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Klein D (1990) Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX security workshop, Aug 1990

    Google Scholar 

  2. Ahmed AAE, Traore I (2005) Anomaly intrusion detection based on biometrics," Information assurance workshop, IAW ‘05. Proceedings from the sixth annual IEEE SMC, pp 452–453, 15–17 June 2005

    Google Scholar 

  3. Jain AK, Ross A, Prabhakar S (2004) An introduction to biometric recognition. IEEE Trans Circuits Syst Video Technol, Spec Issue on Image Video-Based Biometrics 14(1)

    Google Scholar 

  4. Monrose F, Rubin A (1997) Authentication via keystroke dynamics. 4th ACM conference on computer and communications security, pp 48–56

    Google Scholar 

  5. Postley HJ, Bender SS (2007) Key sequence rhythm recognition system and method. US patent 7,206,938

    Google Scholar 

  6. Revett K (2009) A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control Autom Syst 7(1):7–15

    Article  Google Scholar 

  7. Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics. ACM Trans Inf Syst Secur 5(4):367–397

    Article  Google Scholar 

  8. Bergadano F, Gunetti D, Picardi C (2002) User authentication through keystroke dynamics ACM ACM Trans Inf Syst Secur 5(4):367–397

    Google Scholar 

  9. Umphress D, Williams G (1985) Identity verification through key-board characteristics. Int J Man Mach Stud 23(3):263–274

    Article  Google Scholar 

  10. Joyce R, Gupta G (1990) Identity authorization based on keystroke latencies. Commun ACM 33(2):168–176

    Article  Google Scholar 

  11. Brown M, Rogers SJ (1994) A practical approach to user authentication. Computer security applications conference, 1994. Proceedings of 10th annual, pp 108–116, 5-9 Dec 1994

    Google Scholar 

  12. Obaidat MS, Sadoun B (1997) Verification of Computer Users Using Keystroke Dynamics. IEEE Trans Syst Man Cybern-Part B 24(2):261–269

    Google Scholar 

  13. Martı J et al (2007) Recognizing individual typing patterns IbPRIA 2007, Part II, LNCS 4478, 323–330

    Google Scholar 

  14. Rudrapal D et al (2012) A study and analysis of keystroke dynamics and its enhancement for proficient user authentication ICECT-2012, Apr 6–8th

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dwijen Rudrapal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Rudrapal, D., Das, S. (2013). Analysis and Evaluation of Keystroke Duration of User’s Typing as a Distinctive Measure of Recognition. In: S, M., Kumar, S. (eds) Proceedings of the Fourth International Conference on Signal and Image Processing 2012 (ICSIP 2012). Lecture Notes in Electrical Engineering, vol 221. Springer, India. https://doi.org/10.1007/978-81-322-0997-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-0997-3_34

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-0996-6

  • Online ISBN: 978-81-322-0997-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics